4.6 Article

An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A tree-based stacking ensemble technique with feature selection for network intrusion detection

Mamunur Rashid et al.

Summary: This study introduces a tree-based stacking ensemble technique (SET) for intrusion detection systems (IDS). Through testing on two intrusion datasets, the proposed model exhibits better ability in identifying normal and anomaly traffic, showing potential for cybersecurity in Internet of Things (IoT) and large scale networks.

APPLIED INTELLIGENCE (2022)

Article Chemistry, Medicinal

Machine Learning for Prediction of Drug Targets in Microbe Associated Cardiovascular Diseases by Incorporating Host-pathogen Interaction Network Parameters

Nirupma Singh et al.

Summary: Host-pathogen interactions were analyzed using machine learning algorithms to classify drug targets for therapeutic intervention in Microbe Associated Cardiovascular Diseases. The Random Forest classifier achieved high accuracy in predicting drug targets for host and pathogen proteins, highlighting the importance of Eigenvector Centrality in host-pathogen interactions and other key features for classification. The study identified potential drug targets that can be experimentally validated for therapeutic intervention in Microbe Associated Cardiovascular Diseases.

MOLECULAR INFORMATICS (2022)

Article Mathematical & Computational Biology

An Ensemble-Based Multiclass Classifier for Intrusion Detection Using Internet of Things

Deepti Rani et al.

Summary: Internet of Things (IoT) is a rapidly growing technology that connects billions of smart devices through the Internet, and it has applications in various domains such as healthcare and transportation. A secure network is essential for IoT, but with the increasing number of interconnected devices, cybersecurity issues are becoming more prevalent. This article demonstrates that external users can access IoT devices and infer user activity through network traffic analysis. The article also evaluates the performance of various machine learning algorithms in designing an efficient intrusion detection system (IDS) using telemetry datasets from different IoT scenarios.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Experimental Analysis of Classification for Different Internet of Things (IoT) Network Attacks Using Machine Learning and Deep learning

Anika Tasnim et al.

Summary: The internet of things (IoT) is regarded as one of the most revolutionary technologies today due to its pervasive nature, increasing network connection capacity, and diversity of linked items. However, the lack of sufficient security measures remains a major obstacle for IoT growth. This article presents an analysis of six machine learning and deep learning approaches for identifying and classifying IoT network attacks. The results show promising performance, with decision tree and random forest models outperforming others in both binary and multiclass classification scenarios.

2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA) (2022)

Article Computer Science, Information Systems

Feature selection for intrusion detection system in Internet-of-Things (IoT)

Pushparaj Nimbalkar et al.

Summary: This paper proposes a feature selection method for intrusion detection systems using Information Gain and Gain Ratio, achieving higher performance in detecting DoS and DDoS attacks on IoT-BoT and KDD Cup 1999 datasets.

ICT EXPRESS (2021)

Article Computer Science, Information Systems

Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection

Joseph Bamidele Awotunde et al.

Summary: The Industrial Internet of Things (IIoT) research area connects digital equipment and services to physical systems and faces challenges from various cyberattacks. A deep learning-based intrusion detection system with hybrid feature selection and neural network model is proposed to protect IIoT systems.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Proceedings Paper Computer Science, Cybernetics

A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks

Imtiaz Ullah et al.

2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2020)

Article Computer Science, Information Systems

TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems

Abdullah Alsaedi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Evaluation of Tree-Based Ensemble Machine Learning Models in Predicting Stock Price Direction of Movement

Ernest Kwame Ampomah et al.

INFORMATION (2020)

Article Computer Science, Information Systems

RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks

Mohamed Amine Ferrag et al.

FUTURE INTERNET (2020)

Article Computer Science, Information Systems

ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network

Andria Procopiou et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Theory & Methods

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

Nickolaos Koroniotis et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

Nour Moustafa et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Supervised Intrusion Detection System for Smart Home IoT Devices

Eirini Anthi et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Genetics & Heredity

Gene Expression Value Prediction Based on XGBoost Algorithm

Wei Li et al.

FRONTIERS IN GENETICS (2019)

Article Computer Science, Information Systems

A Novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks

Ansam Khraisat et al.

ELECTRONICS (2019)

Article Computer Science, Information Systems

Network Intrusion Detection for IoT Security Based on Learning Techniques

Nadia Chaabouni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

Bander Ali Saleh Al-rimy et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Artificial Intelligence

Random forest for label ranking

Yangming Zhou et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Theory & Methods

A security authorization scheme for smart home Internet of Things devices

Bogdan-Cosmin Chifor et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Deep Learning for IoT Big Data and Streaming Analytics: A Survey

Mehdi Mohammadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications

Abebe Diro et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset

Constantinos Kolias et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Proceedings Paper Computer Science, Information Systems

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

Johannes Krupp et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Review Computer Science, Artificial Intelligence

A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches

Mikel Galar et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)

Article Computer Science, Artificial Intelligence

Extremely randomized trees

P Geurts et al.

MACHINE LEARNING (2006)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)

Article Statistics & Probability

Greedy function approximation: A gradient boosting machine

JH Friedman

ANNALS OF STATISTICS (2001)

Article Statistics & Probability

Additive logistic regression: A statistical view of boosting

J Friedman et al.

ANNALS OF STATISTICS (2000)