2023
DOI: 10.3390/app13095427
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection System Using BoT-IoT

Abstract: The rapid growth of the Internet of Things (IoT) has led to an increased automation and interconnectivity of devices without requiring user intervention, thereby enhancing the quality of our lives. However, the security of IoT devices is a significant concern as they are vulnerable to cyber-attacks, which can cause severe damage if not detected and resolved in time. To address this challenge, this study proposes a novel approach using a combination of deep learning and three-level algorithms to detect attacks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Therefore, the BHMML-CADC technique is an effective tool for the automated cyber attack detection process. In Table 4 and Figure 14, detailed classification results of the BHMML-CADC technique are clearly illustrated [33][34][35]. The experimental values highlight that the ensemble learning model achieves worse results.…”
Section: Or Peer Review 13 Of 21mentioning
confidence: 99%
“…Therefore, the BHMML-CADC technique is an effective tool for the automated cyber attack detection process. In Table 4 and Figure 14, detailed classification results of the BHMML-CADC technique are clearly illustrated [33][34][35]. The experimental values highlight that the ensemble learning model achieves worse results.…”
Section: Or Peer Review 13 Of 21mentioning
confidence: 99%
“…The study of S. Alosaimi et al [18] demonstrates an appreciable multi-layer security system using DL for IoT networks. However, it is confined to different types of DDoS attacks only.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper uses the sliding window approach to produce sequential data, which resembles the network packet stream the IoT nodes handle [36]. It has been done using the mathematical principle defined in Equation (18).…”
Section: Sequence Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…It analyzes and scans network traffic to find patterns and signs that denote an effective assault. Conventional types of NIDSs focus on matching incoming traffic signs to a predetermined list of renowned malicious signs (Albulayhi et al, 2021; Alosaimi & Almutairi, 2023; Bhati et al, 2021). This generally results in a high detection rate (DR) for renowned assaults (Jasper Gnana Chandran et al, 2023; Mafarja et al, 2020; Rajesh, Shajin, & Kodeeswara Kumaran, 2022).…”
Section: Introductionmentioning
confidence: 99%