A review and analysis of the bot-iot dataset

JM Peterson, JL Leevy… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Machine learning is rapidly changing the cybersecu-rity landscape. The use of predictive
models to detect malicious activity and identify inscrutable attack patterns is providing levels …

Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure

A Djenna, S Harous, DE Saidouni - Applied Sciences, 2021 - mdpi.com
As a new area of technology, the Internet of Things (IoT) is a flagship and promising
paradigm for innovating society. However, IoT-based critical infrastructures are an appealing …

Artificial intelligence-based malware detection, analysis, and mitigation

A Djenna, A Bouridane, S Rubab, IM Marou - Symmetry, 2023 - mdpi.com
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with
rapid deployment and self-propagation. In addition, modern malware is one of the most …

Unmasking cybercrime with artificial-intelligence-driven cybersecurity analytics

A Djenna, E Barka, A Benchikh, K Khadir - Sensors, 2023 - mdpi.com
Cybercriminals are becoming increasingly intelligent and aggressive, making them more
adept at covering their tracks, and the global epidemic of cybercrime necessitates significant …

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

K Zarzycki, P Chaber, K Cabaj, M Ławryńczuk… - Sensors, 2023 - mdpi.com
This work is concerned with the vulnerability of a network industrial control system to cyber-
attacks, which is a critical issue nowadays. This is because an attack on a controlled process …

[PDF][PDF] Contemporary Cyber Threats to Critical Infrastructures: Management and Countermeasures

K Mitsarakis - 2023 - core.ac.uk
This dissertation was written as a part of the MSc in Cybersecurity at the International
Hellenic University. Nowadays, the unobstructed functioning of society is increasingly …

Dual use of Internet of Things technology in accounting automation and cybersecurity

O Desyatnyuk, V Muravskyi… - 2022 12th …, 2022 - ieeexplore.ieee.org
The digitalization of communication processes has contributed to the active spread of
Internet of Things (IoT) technology, which is dual used for automated processing of …

[PDF][PDF] Selection of efficient machine learning algorithm on Bot-IoT dataset for intrusion detection in internet of things networks

I Kerrakchou, A Abou El Hassan, S Chadli… - Indonesian Journal of …, 2023 - academia.edu
With the growth of internet of things (IoT) systems, they have become the target of malicious
third parties. In order to counter this issue, realistic investigation and protection …

Feature evaluation for IoT botnet traffic classification

JL Leevy, TM Khoshgoftaar… - International Journal of …, 2022 - inderscienceonline.com
Researchers must often decide whether to use destination port as an input feature when
building predictive models for intrusion detection systems. To evaluate this feature, we use …

Soluciones de ciberseguridad contra los ataques a redes IoT en América Latina, una Revisión Sistemática de la Literatura

AM Celi Sandoya - 2023 - dspace.ups.edu.ec
La seguridad en IoT se considera una necesidad crítica y desafiante, los ataques a las
redes IoT ponen en peligro a las personas, economías, empresas, entre otros; y la …