2019 Chinese Control Conference (CCC) 2019
DOI: 10.23919/chicc.2019.8866088
|View full text |Cite
|
Sign up to set email alerts
|

Detection of IoT Botnet Based on Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 5 publications
0
21
0
Order By: Relevance
“…They also reported 95.14% accuracy on CNN, whereas our CNN achieved 100% accuracy. The one notable difference where our models returned minimum accuracy is against the N_BaIoT dataset, where Reference [53] reported 99.57% accuracy on CNN and 96.13% on MLP, our models achieving on average 90.80% accuracy. Lastly, Reference [85] reported only 54.43% accuracy on MLP compared to our MLP classifier achieving 100% accuracy.…”
Section: Models Versus Datasets a Comparison Studymentioning
confidence: 87%
See 1 more Smart Citation
“…They also reported 95.14% accuracy on CNN, whereas our CNN achieved 100% accuracy. The one notable difference where our models returned minimum accuracy is against the N_BaIoT dataset, where Reference [53] reported 99.57% accuracy on CNN and 96.13% on MLP, our models achieving on average 90.80% accuracy. Lastly, Reference [85] reported only 54.43% accuracy on MLP compared to our MLP classifier achieving 100% accuracy.…”
Section: Models Versus Datasets a Comparison Studymentioning
confidence: 87%
“…Firstly, we implemented a Multilayer Perceptron (MLP), which is a feed-forward Neural Network and consists of an input, hidden, and an output layer. It has frequently been used for network anomaly detection [11,[51][52][53][54]. Autoencoders (A.E.)…”
Section: Deep Learning Classifiers For Sequential Datamentioning
confidence: 99%
“…ey exploit the weight sharing properties of the CNN to classify the traffic, which makes it efficient to be deployed in resource-constrained hardware. To efficiently extract features from network traffic, authors in [29] employ damped incremental statistics as basic features. ey then use triangle area maps (TAMs)-based multivariate correlation analysis (MCA) to generate grayscale images as training data from normalized traffic features.…”
Section: Network Behaviours In Iotmentioning
confidence: 99%
“…Research in [14] produces output from detecting malware in the form of malware label and benign label. Research in [25] considers the output is in the form of benign traffic label and attack traffic label. Research in [7] produces output in the form of a normal label and attack label.…”
Section: Outputmentioning
confidence: 99%