2020
DOI: 10.1002/ett.3999
|View full text |Cite
|
Sign up to set email alerts
|

BotDetector: An extreme learning machine‐based Internet of Things botnet detection model

Abstract: The development of artificial intelligence has brought new methods for botnet detection. For better performance, deep learning (DL) is more and more widely employed to botnet detecting. The existing DL‐based botnet detection methods require lots of computing resources and running time. While in the real Internet of Things (IoT) environment, real‐time and low computing consumption are much needed. Therefore, the DL‐based methods seem to be powerless in real‐time IoT scenarios. For these reasons, this article pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…Although AI chips usually have special hardware accelerators, their design also pays attention to flexibility and programmability. This means that AI chips can adapt to different AI tasks and be used flexibly in different application scenarios [9]. The programmable design enables the chip to adapt to the new algorithm and model structure through firmware or software update.…”
Section: Analysis Of Hardware Characteristics Of Ai Chipmentioning
confidence: 99%
“…Although AI chips usually have special hardware accelerators, their design also pays attention to flexibility and programmability. This means that AI chips can adapt to different AI tasks and be used flexibly in different application scenarios [9]. The programmable design enables the chip to adapt to the new algorithm and model structure through firmware or software update.…”
Section: Analysis Of Hardware Characteristics Of Ai Chipmentioning
confidence: 99%
“…Some basic features are used in this research, as in [6,19]. The remaining 𝑓𝑐 can be developed into new ones through the engineering feature using onehot encoding [25]. For example, the 𝐷𝑖𝑟 , can be explored into features of 𝐷𝑖𝑟_ <-, 𝐷𝑖𝑟_ <, 𝐷𝑖𝑟_ <-, 𝐷𝑖𝑟_ <->.…”
Section: Feature Engineeringmentioning
confidence: 99%
“…Today, most distributed denial-of-service (DDoS) attacks are initiated by botnets, and this case is slowly turning to IoT systems as well. 7 Decision support systems with an artificial intelligence infrastructure are systems that can do much more than humans. There are many studies in the literature where IoT technologies and artificial intelligence approaches are used together.…”
Section: Introductionmentioning
confidence: 99%
“…The dataset they used for their studies was freely available and their overall accuracy in detecting DDoS attacks was 99.38%. Dong et al 7 designed a machine learning-based detector for botnet detection. In their proposed approach, they performed analysis using extreme learning machine (ELM) method instead of deep learning models.…”
Section: Introductionmentioning
confidence: 99%