2019
DOI: 10.1109/access.2019.2937347
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach

Abstract: The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer services in the organization. Currently, software piracy and malware attacks are high risks to compromise the security of IoT. These threats may steal important information that causes economic and reputational damages. In this paper, we have proposed a combined deep learning approach to detect the pirated software and malware-infected files across the Io… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
72
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 168 publications
(72 citation statements)
references
References 38 publications
0
72
0
Order By: Relevance
“…Ullah et al [ 104 ] proposed a tensor-flow-based Deep neural network approach to detect software piracy and other malware-based attacks in the industrial IoT network. This DNN is used for capturing pirated software from the source code of different programmers from google code jam followed by an application of CNN to detect footprints via binary visualization on colored images of malware files.…”
Section: Learning-based Solutions For Securing Iotmentioning
confidence: 99%
“…Ullah et al [ 104 ] proposed a tensor-flow-based Deep neural network approach to detect software piracy and other malware-based attacks in the industrial IoT network. This DNN is used for capturing pirated software from the source code of different programmers from google code jam followed by an application of CNN to detect footprints via binary visualization on colored images of malware files.…”
Section: Learning-based Solutions For Securing Iotmentioning
confidence: 99%
“…Security challenges and threats in industrial IoT networks call for innovative applications of ML/DL techniques for IoT security. More specifically, these techniques can be employed for authentication and access control, anomaly and intrusion detection, malware analysis and distributed denial-of-service (DDoS) attacks detection and mitigation [24], [25]. The main challenges of implementing ML/DL models at the edge are scalability issues and IoT edge platforms resource limitations [13].…”
Section: B Machine Learning For Anomaly Detection At the Edgementioning
confidence: 99%
“…When a network attack occurs in an SDN, ML can be introduced as a detection technology to dynamically control and route the communication flow. Recently, studies using ML to detect and automatically respond to DDoS attacks, abnormal patterns, and data leaks against IoT networks and devices have increased [60,[189][190][191][192][193][194][195][196][197][198][199].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%