Please use this identifier to cite or link to this item: https://scidar.kg.ac.rs/handle/123456789/22667
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFranc, Igor-
dc.contributor.authorMaček, Nemanja-
dc.contributor.authorBogdanoski, Mitko-
dc.contributor.authorMirković, Aleksandar-
dc.contributor.authorĐokić, Dragan-
dc.date.accessioned2025-11-06T11:28:46Z-
dc.date.available2025-11-06T11:28:46Z-
dc.date.issued2016-
dc.identifier.isbn978-86-89755-10-7en_US
dc.identifier.urihttps://scidar.kg.ac.rs/handle/123456789/22667-
dc.description.abstractAnomalies in IoT typically occur as a result of malicious activity. As an example, a point anomaly may occur once network intrusion is attempted, while collective anomaly may result from device being hacked. Due to the nature of the attacks, some anomalies are represented by incomplete captured instances or imbalanced captured datasets. For example, features may have some values missing from the row or may contain both categorical and numerical values. Once pre-processed, these datasets become suitable training sets for any machine learning classifier that detects anomalies. However, there are situations where pre-processing takes large amount of time in the operating phase or simply is not executable due to the nature of the data. For example, a feature that contains unknown number of categorical values, such as strings, cannot be converted into finite number of binary features before the training. In this scenarios, basic machine learning methods, such as Support Vector Machines or Decision Trees either fail to operate or provide poor classification performance. Unlike basic, ensemble learners manage these data instances efficiently and provide good anomaly detection rates. This paper analyses the performance of ensemble learners on incomplete IoT intrusion datasets, represented by point anomalies.en_US
dc.language.isoenen_US
dc.publisherBelgrade Metropolitan Universityen_US
dc.subjectDatasetsen_US
dc.subjectAnomalyen_US
dc.subjectEnsembleen_US
dc.subjectBoostingen_US
dc.subjectGentleBoosten_US
dc.titleDetecting Malicious Anomalies in IoT: Ensemble Learners and Incomplete Datasetsen_US
dc.title.alternativeDetekcija anomalija u IoT okruzenju sa nekompletnim datasetovimaen_US
dc.typeconferenceObjecten_US
dc.description.versionPublisheden_US
dc.type.versionPublishedVersionen_US
dc.source.conferenceThe Eighth International Conference on Business Information Security (BISEC-2016), 15th October 2016, Belgrade, Serbiaen_US
Appears in Collections:Faculty of Mechanical and Civil Engineering, Kraljevo

Page views(s)

39

Downloads(s)

11

Files in This Item:
File Description SizeFormat 
Detecting Malicious Anomalies in IoT: Ensemble Learners and Incomplete Datasets.pdf247.04 kBAdobe PDFThumbnail
View/Open


Items in SCIDAR are protected by copyright, with all rights reserved, unless otherwise indicated.