2022
DOI: 10.3390/s22103895
|View full text |Cite
|
Sign up to set email alerts
|

Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet

Abstract: In recent times, organisations in a variety of businesses, such as healthcare, education, and others, have been using the Internet of Things (IoT) to produce more competent and improved services. The widespread use of IoT devices makes our lives easier. On the other hand, the IoT devices that we use suffer vulnerabilities that may impact our lives. These unsafe devices accelerate and ease cybersecurity attacks, specifically when using a botnet. Moreover, restrictions on IoT device resources, such as limitation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
1
0
Order By: Relevance
“…The early stages of the malware life cycle were examined through an experiment conducted using the MedBIoT dataset. The results, generated using SOTA ML [61], [62], DL [41], [45], [61] , and DRL [70]models, indicate that these models exhibit good performance in detecting malware activities, with the exception of a few ML models. Related performance metrics are detailed in Table X and Fig.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…The early stages of the malware life cycle were examined through an experiment conducted using the MedBIoT dataset. The results, generated using SOTA ML [61], [62], DL [41], [45], [61] , and DRL [70]models, indicate that these models exhibit good performance in detecting malware activities, with the exception of a few ML models. Related performance metrics are detailed in Table X and Fig.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…However, this approach neglects low-traffic DDoS attacks. Wazzan et al [41]have employed a different architecture as compared to Alghazzawi et al [40] to investigate the propagation stages of malware botnets and their communication with the C&C. Their proposed approach yielded promising results, achieving an accuracy rate of 99.7%. However, the authors have used a simulated dataset for their evaluation, which may differ from real-world scenarios.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This growth will be reflected in the fact that scientists consider the number of IoT interconnections to reach 83 billion by the year 2024 [ 1 ]. Since these electronics are connected to the internet and accessible around the clock, it is simple to obtain accurate data in a timely manner [ 2 , 3 ]. As a result, the proliferation of wireless telecommunication infrastructures, wireless handheld devices (such as mobiles), and wireless communication networks has made it possible to organize massive amounts of data at once.…”
Section: Introductionmentioning
confidence: 99%