You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Correction
  • Open Access

3 October 2025

Correction: Okey et al. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Sensors 2022, 22, 7409

,
,
,
,
,
and
1
Department of Systems Engineering and Automation, Federal University of Lavras, Lavras 37203-202, MG, Brazil
2
Faculty of Data Science and Information Technology (FDSIT), INTI International University, Nilai 71800, Malaysia
3
Department of Electrical Engineering, University of Santiago de Chile, Santiago 9170124, Chile
4
Department of Computer Science, Federal University of Lavras, Lavras 37200-000, MG, Brazil
This article belongs to the Section Communications

Text Correction

There was an error in the original publication [1]. A correction has been made due to an error in the presentation of the percentage values in paragraph 13 in the Section 4 Results and Discussion.
In terms of the F-score, which is the weighted mean of the recall and precision of the model behavior, Table 8 demonstrates that the EnsHMV reached 96.36%, 99.84%, 99.99%, 99.89%, 98.90%, 99.69%, 100%, 99.5%, 99.92%, and 99.88% in classifying the benign, botnet, brute force, DDoS, DoS, heartbleed, infiltration, portscan, and web attack traffics in the CICIDS2017 dataset, respectively, while on the CSE-CICIDS2018 dataset, the EnsHMV attained an F-score performance of 99.78%, 100%, 100%, 100%, 99.99%, 99.99%, and 100% in classifying the benign, botnet, brute force, DDoS, DoS, infiltration, and web attack flows, respectively. Similarly, the BoostedEnML showed higher performance than the EnsHMV in relation to the F-score measure on both datasets. Specifically, on the CICIDS2017 dataset, the BoostedEnML showed an F-score of 100% in the classification of the benign, botnet, brute Force, DDoS, Dos, heartbleed, infiltration, portscan, and web attack flows. It also achieved 100% in detecting the benign, botnet, brute force, DDoS, DoS, infiltration, and web attack packets in the CSE-CICIDS2018 dataset.

Error in Table

In the original publication, there was a mistake in the data in Table 8. The correct data appears below.
The authors state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.
Table 8. Performance of the IDS models (EnsHMV and BoostedEnsML) in detecting and classifying each network traffic class in the two datasets.
Table 8. Performance of the IDS models (EnsHMV and BoostedEnsML) in detecting and classifying each network traffic class in the two datasets.
EnsHMVBoostedEnML
DatasetClassPrecisionRecallF-ScorePrecisionRecallF-Score
CICIDS2017Benign97.9599.4596.3699.8999.95100
Bot99.7799.9299.8499.9799.9999.99
Brute Force99.9899.9999.9910010099.99
DDoS98.8099.8998.8998.9099.6599.80
DoS99.6898.9099.69100100100
Hearbleed100100100100100100
Infiltration99.8999.6799.69100100100
PortScan99.9399.9299.9599.9999.9999.99
Web Attack99.6699.6699.88100100100
PrecisionRecallF-ScorePrecisionRecallF-Score
CICIDS2018Benign99.6699.9099.7899.9999.9999.98
Bot100100100100100100
Brute Force99.9910010010099.9999.99
DDoS99.9910010010099.99100
DoS99.9999.9999.9999.9910099.99
Infiltration99.9910099.99100100100
Web Attack100100100100100100

Reference

  1. Okey, O.D.; Maidin, S.S.; Adasme, P.; Rosa, R.L.; Saadi, M.; Carrillo Melgarejo, D.; Zegarra Rodríguez, D. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Sensors 2022, 22, 7409. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.