2020
DOI: 10.1007/s10586-020-03153-8
|View full text |Cite
|
Sign up to set email alerts
|

TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…In RACC (Mahdavi et al, 2020) (Real-time Alert Correlation based on Codebooks) codebooks correspond to attack scenarios that are mapped to incoming real-time alerts using matrix operations. TempoCode-IoT (Siddiqui and Boukerche, 2021) uses a flow function representation based on unsupervised learning of a temporal codebook that captures key patterns in data across different time windows. Cluster centers from each time window data are stored as codewords.…”
Section: Rule-based Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…In RACC (Mahdavi et al, 2020) (Real-time Alert Correlation based on Codebooks) codebooks correspond to attack scenarios that are mapped to incoming real-time alerts using matrix operations. TempoCode-IoT (Siddiqui and Boukerche, 2021) uses a flow function representation based on unsupervised learning of a temporal codebook that captures key patterns in data across different time windows. Cluster centers from each time window data are stored as codewords.…”
Section: Rule-based Modelsmentioning
confidence: 99%
“…• Rule-based correlation models -similarity rules (SimR) (Kotenko et al, 2020), causal rules (CauR) (Mahdavi et al, 2020;Siddiqui and Boukerche, 2021), composite rules (ComR) (Tao et al, 2021) and rule mining models (RM) (Xie et al, 2018;Bénard et al, 2021). • Semantic correlation models -signature language-based (SigL) (Almseidin et al, 2019;Tidjon et al, 2020), event embedding (EE) (Lee et al, 2021;Seyyar et al, 2022), and ontology learning (OL) (Zheng et al, 2018;Deng and Hooi, 2021) models.…”
Section: Summary Of Ai-based Security Event Correlation Modelsmentioning
confidence: 99%
“…Siddiqui and Boukerche [62] have proposed a networkbased intrusion detection method which learns patterns of normal flows in a temporal codebook. Based on the temporally learnt codebook, they proposed a feature representation method to transform the flow-based statistical features into more discriminative representations, called TempoCode-IoT.…”
Section: Ids Solutions For Iotmentioning
confidence: 99%
“…They demonstrated that RNNs are helpful to generate new, unseen mutants of attacks as well as synthetic signatures from the most advanced malware to improve the intrusion detection rate. The authors in [20] proposed a feature representation method to transform the raw flow-based statistical features into more discriminative representations and developed an ensemble of machine learning-based classifiers optimized to discriminate the malicious flows from the benign ones.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%