基于关系嵌入的物联网未知攻击检测方法
李智慧,邓琨,许聪源

Method for detecting unknown IoT attack based on relational embedding
Zhihui LI,Kun DENG,Congyuan XU
表 3 提出方法和相关研究工作的比较
Tab.3 Comparative analysis between proposed method and related works
方法数据集物联网数据集实验设置Ac/%UTRS
LNN[24]BotIoTYN/A96.150.0003
L2F+MAML[9]CICIDS2017N2-way 10-shot94.6610.00
MAML+CNN[8]FSIDSIOTY5-way 5-shot89.6428.91
MAML+CNN[8]FSIDSIOTY5-way 10-shot92.1918.16
IPN-IDS[23]CICIDS2017N5-way 5-shot84.9425.57
IPN-IDS [23]CICIDS2017N5-way 10-shot86.3515.21
CIDIOT[25]CICIOT2023YN/A77.200.017
本文方法CICIDS2017N5-way 5-shot98.8231.41
本文方法CICIDS2017N5-way 10-shot98.8919.08
本文方法BotIoTY5-way 5-shot99.3034.89
本文方法BotIoTY5-way 10-shot99.3322.49
本文方法CICIOT2023Y5-way 5-shot93.5029.91
本文方法CICIOT2023Y5-way 10-shot93.1218.16