A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy

ZR Alashhab, M Anbar, MM Singh, IH Hasbullah… - Applied Sciences, 2022 - mdpi.com
Cloud computing (CC) plays a significant role in revolutionizing the information and
communication technology (ICT) industry, allowing flexible delivery of new services and …

A hybrid deep learning approach for bottleneck detection in IoT

F Sattari, AH Farooqi, Z Qadir, B Raza, H Nazari… - IEEE …, 2022 - ieeexplore.ieee.org
Cloud computing is perhaps the most enticing innovation in the present figuring situation. It
gives an expense-effective arrangement by diminishing the enormous forthright expense of …

SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Real-time bot infection detection system using DNS fingerprinting and machine-learning

V Quezada, F Astudillo-Salinas, L Tello-Oquendo… - Computer Networks, 2023 - Elsevier
In today's cyberattacks, botnets are used as an advanced technique to generate
sophisticated and coordinated attacks. Infected systems connect to a command and control …

A hybrid model for botnet detection using machine learning

A Zaheer, S Tahir, MF Almufareh… - … Conference on Business …, 2023 - ieeexplore.ieee.org
Botnet attacks are becoming a growing threat to the security of computer networks, and there
is a need for effective and efficient methods for detecting these attacks. In this study, we …

Machine learning for multi-classification of botnets attacks

TC Tran, TK Dang - 2022 16th International Conference on …, 2022 - ieeexplore.ieee.org
The number of Internet of Things (IoT) devices connected to the network enlarges
dramatically these days. This leads to rising cyberattacks, such as botnets. These attacks …

A hybrid rule-based and machine learning system for Arabic check courtesy amount recognition

I Ahmad - Sensors, 2023 - mdpi.com
Courtesy amount recognition from bank checks is an important application of pattern
recognition. Although much progress has been made on isolated digit recognition for Indian …

A Distributed Model for IoT Anomaly Detection Using Federated Learning

S Tahir, A Zaheer - Cybersecurity Measures for Logistics Industry …, 2024 - igi-global.com
Anomaly detection in IoT-based sleep patterns is crucial for early identification of health
issues. This chapter presents a distributed model using federated learning for privacy and …

ITransformer_CNN: A Malicious DNS Detection Method with Flexible Feature Extraction

W Zhang, W Chen, Z Zhang, F Zhang… - Available at SSRN …, 2022 - papers.ssrn.com
As an important network service, domain name system (DNS) is abused by attackers.
Malicious domain name detection has become an important task to combat network crime …