2022 International Symposium on Electronics and Smart Devices (ISESD) 2022
DOI: 10.1109/isesd56103.2022.9980630
|View full text |Cite
|
Sign up to set email alerts
|

XGBoost for IDS on WSN Cyber Attacks with Imbalanced Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Some studies show that XGBoost is better than others tree-model-based due to its ensemble classifier. Putrada et al [26] proposed and successfully implemented XGBoost for IDS on the WSN cyberattack dataset with imbalanced data. Deepak et al [27] had the best-generalized model to detect real-time cyber-attacks using XGBoost.…”
Section: Related Workmentioning
confidence: 99%
“…Some studies show that XGBoost is better than others tree-model-based due to its ensemble classifier. Putrada et al [26] proposed and successfully implemented XGBoost for IDS on the WSN cyberattack dataset with imbalanced data. Deepak et al [27] had the best-generalized model to detect real-time cyber-attacks using XGBoost.…”
Section: Related Workmentioning
confidence: 99%
“…tree. Then, the final result of the model is a majority vote from all weak learners [19]. Finally, CNN is a type of deep learning where one type of sublayer is the convolutional layer, namely a kernel that carries out the convolution process on the input data [20].…”
Section: The Cima Windowing Algorithmmentioning
confidence: 99%
“…In a dataset, an imbalance can occur when the number of one label is much greater than the other labels [21]. The impact of imbalance is twofold [22].…”
Section: The Cima Windowing Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…There are now such well machine learning-based [16][17][18] intrusion detection methods have been developed for WSNs, which includes decision trees, random forests, naive Bayes, logistic regression, and deep learning models. Most of the existing works [19,20] facing the problems associated to the factors of ineffective detection performance, high false positives, computational burden, and complexity in intrusion detection. Thus, the proposed work aims to develop an effective and competent IDS framework for assuring the security of WSNs.…”
Section: Introductionmentioning
confidence: 99%