DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps

A Zainudin, R Akter, DS Kim… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unauthorized users may attack centralized controllers as an attractive target in software-
defined networking (SDN)-based industrial cyber-physical systems (CPS). Managing high …

A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection

MA Hossain, MS Islam - Scientific Reports, 2023 - nature.com
In the age of sophisticated cyber threats, botnet detection remains a crucial yet complex
security challenge. Existing detection systems are continually outmaneuvered by the …

DroidDetectMW: a hybrid intelligent model for android malware detection

F Taher, O AlFandi, M Al-kfairy, H Al Hamadi… - Applied Sciences, 2023 - mdpi.com
Malicious apps specifically aimed at the Android platform have increased in tandem with the
proliferation of mobile devices. Malware is now so carefully written that it is difficult to detect …

Adaptive chaotic dynamic learning-based gazelle optimization algorithm for feature selection problems

M Abdel-Salam, H Askr, AE Hassanien - Expert Systems with Applications, 2024 - Elsevier
Feature Selection (FS) is considered a crucial procedure for eliminating unnecessary
features from datasets. FS is considered a challenging problem that is difficult to solve …

An improved multi-strategy Golden Jackal algorithm for real world engineering problems

M Elhoseny, M Abdel-salam, IM El-Hasnony - Knowledge-Based Systems, 2024 - Elsevier
Abstract The Golden Jackal Optimization (GJO) algorithm is a novel, nature-inspired
optimization technique that has gained recognition as a highly promising metaheuristic due …

A Genetic Algorithm-and t-Test-Based System for DDoS Attack Detection in IoT Networks

MF Saiyed, I Al-Anbagi - IEEE Access, 2024 - ieeexplore.ieee.org
Internet and cloud-based technologies have facilitated the implementation of large-scale
Internet of Things (IoT) networks. However, these networks are susceptible to emerging …

A methodical examination of single and multi-attacker flood attacks using RPL-based approaches

S Gönen - Computers & Industrial Engineering, 2024 - Elsevier
Abstract The Internet of Things (IoT) constitutes an intricate network of physical entities,
ranging from vehicles to home appliances, each ingrained with electronics, software …

Kernel Methods for Conformal Prediction to Detect Botnets

QV Dang, TH Pham - International Conference on Artificial Intelligence on …, 2023 - Springer
Botnets are networks of compromised computers controlled by malicious actors and are
responsible for a wide range of cyberattacks. Detecting botnets is a critical task in …

Review for Prevention of Botnet Attack Using Various Detection Techniques in IoT and IIoT

M Goyal, S Mittal - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is the networking of various intelligent devices to
smoothen industrial operations like manufacturing and SCM etc. The use of IIoT networks is …