2022
DOI: 10.3390/s22249837
|View full text |Cite
|
Sign up to set email alerts
|

Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning

Abstract: The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. However, these networks are still vulnerable to botnet attacks such as distributed denial of service, network probing, backdoors, information stealing, and phishing attacks. These attacks can disrupt and sometimes cause irreversible damage to several sectors of the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 115 publications
0
12
0
Order By: Relevance
“…This comprehensive approach, integrating deep learning and advanced feature selection techniques, aimed to optimize intrusion detection by effectively identifying relevant features and classifying distinct attack types within the dataset. [14,15] EXPRIMENTS Google TensorFlow served as the platform for conducting the experiments, offering an interface for network visualization. These experiments were conducted on an Ubuntu 16.10 Dis tribution Operating System, utilizing an environment featuring an Intel i5 3.2 GHz processor, 16 GB RAM, and an NVIDIA GTX 1070 graphics card.…”
Section: Methodsmentioning
confidence: 99%
“…This comprehensive approach, integrating deep learning and advanced feature selection techniques, aimed to optimize intrusion detection by effectively identifying relevant features and classifying distinct attack types within the dataset. [14,15] EXPRIMENTS Google TensorFlow served as the platform for conducting the experiments, offering an interface for network visualization. These experiments were conducted on an Ubuntu 16.10 Dis tribution Operating System, utilizing an environment featuring an Intel i5 3.2 GHz processor, 16 GB RAM, and an NVIDIA GTX 1070 graphics card.…”
Section: Methodsmentioning
confidence: 99%
“…Dynamic behavior: IoT networks exhibit dynamic behaviors, with devices joining, leaving, or reconfiguring themselves continuously. Dynamic nature demands adaptive security measures [37]. Data sensitivity: IoT devices collect and transmit sensitive data, making data privacy and confidentiality paramount concerns [38] applications and deployment of IoT sensor networks.…”
Section: Iot Sensor Network: a Brief Overviewmentioning
confidence: 99%
“…The most challenging aspect of evaluating IDS is selecting an appropriate dataset. This section discusses commonly [37], [38]. However, these datasets are inherently complex, necessitating advanced solutions.…”
Section: Datasetsmentioning
confidence: 99%
“…A variety of attacks, such as DDoS (Distributed Denial of Service), DoS (Denial of Service), scanning assaults, and information theft, can be carried out using this vulnerable position [7][8][9]. Conventional neural network-based Network Intrusion Detection Systems (NIDS) tend to incur high resource consumption, making them impractical for deployment in Internet gateways, routers, and Internet of Things (IoT) devices [10,11].…”
Section: Related Workmentioning
confidence: 99%
“…Numerous investigations have highlighted the efficiency of employing CNN in the classification of tabular data [10,11,13]. In the present research, we introduce a lightweight CNN model tailored specifically for this purpose.…”
Section: Proposed Approachmentioning
confidence: 99%