A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
Tài liệu tham khảo
Cisco, 2020
Al-Fuqaha, 2015, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Commun. Surv. Tutor., 17, 2347, 10.1109/COMST.2015.2444095
Nitti, 2015, The virtual object as a major element of the Internet of Things: A survey, IEEE Commun. Surv. Tutor., 18, 1228, 10.1109/COMST.2015.2498304
Makhdoom, 2018, Anatomy of threats to the Internet of things, IEEE Commun. Surv. Tutor., 21, 1636, 10.1109/COMST.2018.2874978
Stellios, 2018, A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services, IEEE Commun. Surv. Tutor., 20, 3453, 10.1109/COMST.2018.2855563
Zarpelão, 2017, A survey of intrusion detection in Internet of Things, J. Netw. Comput. Appl., 84, 25, 10.1016/j.jnca.2017.02.009
Zargar, 2013, A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE Commun. Surv. Tutor., 15, 2046, 10.1109/SURV.2013.031413.00127
Heidari, 2022, Internet of Things intrusion detection systems: A comprehensive review and future directions, Cluster Comput., 1
Xiao, 2018, IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?, IEEE Signal Process. Mag., 35, 41, 10.1109/MSP.2018.2825478
Anthi, 2019, A supervised intrusion detection system for smart home IoT devices, IEEE Internet Things J., 6, 9042, 10.1109/JIOT.2019.2926365
Li, 2020, Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments, J. Netw. Comput. Appl.
Horng, 2011, A novel intrusion detection system based on hierarchical clustering and support vector machines, Expert Syst. Appl., 38, 306, 10.1016/j.eswa.2010.06.066
Eesa, 2015, A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems, Expert Syst. Appl., 42, 2670, 10.1016/j.eswa.2014.11.009
Mohammad, 2021, Intrusion detection using highest wins feature selection algorithm, Neural Comput. Appl., 33, 9805, 10.1007/s00521-021-05745-w
Li, 2018, Ai-based two-stage intrusion detection for software defined iot networks, IEEE Internet Things J., 6, 2093, 10.1109/JIOT.2018.2883344
Aljawarneh, 2018, Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, J. Comput. Sci., 25, 152, 10.1016/j.jocs.2017.03.006
Moustafa, 2018, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things, IEEE Internet Things J., 6, 4815, 10.1109/JIOT.2018.2871719
Kumar, 2021, A distributed ensemble design based intrusion detection system using fog computing to protect the Internet of Things networks, J. Ambient Intell. Humaniz. Comput., 12, 9555, 10.1007/s12652-020-02696-3
Prabavathy, 2018, Design of cognitive fog computing for intrusion detection in Internet of Things, J. Commun. Netw., 20, 291, 10.1109/JCN.2018.000041
Shafiq, 2020, Corrauc: A malicious bot-iot traffic detection method in iot network using machine learning techniques, IEEE Internet Things J.
Hussain, 2020, Machine learning in IoT security: Current solutions and future challenges, IEEE Commun. Surv. Tutor., 22, 1686, 10.1109/COMST.2020.2986444
Shone, 2018, A deep learning approach to network intrusion detection, IEEE Trans. Emerg. Top. Comput. Intell., 2, 41, 10.1109/TETCI.2017.2772792
Tian, 2019, A distributed deep learning system for web attack detection on edge devices, IEEE Trans. Ind. Inform., 16, 1963, 10.1109/TII.2019.2938778
Saba, 2022, Anomaly-based intrusion detection system for IoT networks through deep learning model, Comput. Electr. Eng., 99, 10.1016/j.compeleceng.2022.107810
Kumar, 2021, An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks, Comput. Commun., 166, 110, 10.1016/j.comcom.2020.12.003
Zhao, 2022, A hybrid intrusion detection system based on feature selection and weighted stacking classifier, IEEE Access, 10, 71414, 10.1109/ACCESS.2022.3186975
Le, 2022, IMIDS: An intelligent intrusion detection system against cyber threats in IoT, Electronics, 11, 524, 10.3390/electronics11040524
Li, 2019, Designing collaborative blockchained signature-based intrusion detection in IoT environments, Future Gener. Comput. Syst., 96, 481, 10.1016/j.future.2019.02.064
Alexopoulos, 2017, Towards blockchain-based collaborative intrusion detection systems, 107
Kumar, 2021, A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system, IEEE Trans. Intell. Transp. Syst., 23, 16492, 10.1109/TITS.2021.3098636
Meng, 2018, When intrusion detection meets blockchain technology: A review, Ieee Access, 6, 10179, 10.1109/ACCESS.2018.2799854
Shah, 2023, Deep learning-based malicious smart contract and intrusion detection system for IoT environment, Mathematics, 11, 418, 10.3390/math11020418
Raza, 2013, SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Netw., 11, 2661, 10.1016/j.adhoc.2013.04.014
Sadikin, 2020, A hybrid Zigbee IoT intrusion detection system using secure and efficient data collection, Internet of Things, 10.1016/j.iot.2020.100306
Eskandari, 2020, Passban IDS: An intelligent anomaly based intrusion detection system for IoT edge devices, IEEE Internet Things J., 10.1109/JIOT.2020.2970501
Nespoli, 2021, Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices, J. Inform. Secur. Appl., 60
Mamvong, 2020, Efficient security algorithm for power constrained IoT devices, IEEE Internet Things J.
Anthi, 2019, A supervised intrusion detection system for smart home IoT devices, IEEE Internet Things J., 6, 9042, 10.1109/JIOT.2019.2926365
Li, 2020, Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments, J. Netw. Comput. Appl., 161, 10.1016/j.jnca.2020.102631
Pajouh, 2016, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Top. Comput.
Hong, 2021, Machine learning in cyber security analytics using NSL-KDD dataset, 260
Sun, 2017, CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained Internet of Things (IoT) devices, Softw. - Pract. Exp., 47, 421, 10.1002/spe.2420
Liu, 2018, An intrusion detection method for Internet of Things based on suppressed fuzzy clustering, EURASIP J. Wireless Commun. Networking, 2018, 1, 10.1186/s13638-018-1128-z
Al Olaimat, 2020, A learning-based data augmentation for network anomaly detection, 1
Engelen, 2021, Troubleshooting an intrusion detection dataset: The CICIDS2017 case study, 7
Yin, 2023, IGRF-RFE: A hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset, J. Big Data, 10, 1, 10.1186/s40537-023-00694-8
Pedregosa, 2011, Scikit-learn: Machine learning in Python, J. Mach. Learn. Res., 12, 2825
Zhang, 2004, The optimality of naive Bayes, Aa, 1, 3
Aburomman, 2016, Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection, 636
Dhanabal, 2015, A study on NSL-KDD dataset for intrusion detection system based on classification algorithms, Int. J. Adv. Res. Comput. Commun. Eng., 4, 446
Moustafa, 2015, UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 1
Vishwakarma, 2022, A two-stage intrusion detection system (tids) for Internet of Things, 89
Pajouh, 2017, Two-tier network anomaly detection model: A machine learning approach, J. Intell. Inf. Syst., 48, 61, 10.1007/s10844-015-0388-x
Ashfaq, 2017, Fuzziness based semi-supervised learning approach for intrusion detection system, Inform. Sci., 378, 484, 10.1016/j.ins.2016.04.019
Li, 2020, Robust detection for network intrusion of industrial IoT based on multi-CNN fusion, Measurement, 154, 10.1016/j.measurement.2019.107450
Yulianto, 2019, Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset, 1192
Sharafaldin, 2018, Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp, 1, 108
