4.6 Article

A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT

Jianhua Li et al.

Summary: This article proposes a protocol that combines federated learning and fog/edge computing to combat malicious codes by training a globally optimized model on distributed datasets. The FL-based detection protocol maximizes the value of distributed data samples, improving detection accuracy, reducing mitigation time, and increasing attackers' cost within a defense alliance. Comprehensive evaluations show a 2.7 times increase in cost, a 72% decrease in mitigation response time, and a 47% increase in accuracy on average, with a detection accuracy of approximately 98% in FL.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things

Prosanta Gope et al.

Summary: The Internet of Things (IoT) is becoming increasingly prevalent in daily life and requires strong security measures. Physically unclonable functions (PUFs) offer a low-cost solution for generating unique and secure fingerprints, but are vulnerable to machine learning attacks. This article introduces a lightweight and practical anonymous authentication protocol for IoT, which is resilient against machine learning attacks on PUFs.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Secure Device-to-Device communications for 5G enabled Internet of Things applications

Gurjot Singh Gaba et al.

Summary: Smart cities aim to optimize city operations through the interconnection of IoT devices, which poses a challenge in real-time data exchange. To address this challenge, smart city applications use Device-to-Device (D2D) communications. However, security issues in D2D communications remain a concern.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0

Gurjot Singh Gaba et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

An in-depth experimental study of anomaly detection using gradient boosted machine

Bayu Adhi Tama et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

LR-HIDS: logistic regression host-based intrusion detection system for cloud environments

Elham Besharati et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Review Computer Science, Artificial Intelligence

Ensemble learning: A survey

Omer Sagi et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2018)

Article Computer Science, Artificial Intelligence

Ensemble learning for data stream analysis: A survey

Bartosz Krawczyk et al.

INFORMATION FUSION (2017)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Artificial Intelligence

CANN: An intrusion detection system based on combining cluster centers and nearest neighbors

Wei-Chao Lin et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Proceedings Paper Automation & Control Systems

Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier

D. P. Gaikwad et al.

PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15) (2015)

Review Computer Science, Hardware & Architecture

Intrusion detection system: A comprehensive review

Hung-Jen Liao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection techniques in Cloud

Chirag Modi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Artificial Intelligence

Machine learning and soft computing for ICT security: an overview of current trends

Francesco Camastra et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2013)

Review Computer Science, Artificial Intelligence

A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches

Mikel Galar et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)

Article Computer Science, Information Systems

The cyber threat landscape: Challenges and future research directions

Kim-Kwang Raymond Choo

COMPUTERS & SECURITY (2011)

Article Computer Science, Artificial Intelligence

Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation

Juan Diego Rodriguez et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2010)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)

Article Statistics & Probability

Greedy function approximation: A gradient boosting machine

JH Friedman

ANNALS OF STATISTICS (2001)