2022
DOI: 10.1109/access.2022.3172304
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework

Abstract: Internet of Things (IoT) is an instantly exacerbated communication technology that is manifesting miraculous effectuation to revolutionize conventional means of network communication. The applications of IoT are compendiously encompassing our prevalent lifestyle and the integration of IoT with other technologies makes this application spectrum even more latitudinous. However, this admissibility also introduces IoT with a pervasive array of imperative security hazards that demands noteworthy solutions to be swa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 62 publications
(24 citation statements)
references
References 65 publications
0
24
0
Order By: Relevance
“…Cyber threats could cost up to $ 90 trillion by 2030 if no reasonable alternative is given before then [10,11]. IoMT environments pose three issues as follows: e rst is the heterogeneous network and dynamic nature, the second is its hugely scattered design, and the last is the protocols that the IoT use to address concerns like computing limits and power consumption in network sensors [12,13]. e most common issue in IoMT setups is keylogging, botnet attacks, and zero-day exploits [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber threats could cost up to $ 90 trillion by 2030 if no reasonable alternative is given before then [10,11]. IoMT environments pose three issues as follows: e rst is the heterogeneous network and dynamic nature, the second is its hugely scattered design, and the last is the protocols that the IoT use to address concerns like computing limits and power consumption in network sensors [12,13]. e most common issue in IoMT setups is keylogging, botnet attacks, and zero-day exploits [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…This design is ideal for resource-constrained DDoS attackers due to its negligible management costs, high detectability, and excellent robustness. It is simplified to a variation problem where the objective functional represents the predicted impact of the DDoS attack associated with a DDoS attack method in this architecture and is based on a novel botnet growth model [38]. Finally, the variation problem for three alternative DDoS defense systems has been solved.…”
Section: Related Workmentioning
confidence: 99%
“…References [ 17 , 27 ] mentioned the limitations and issues faced in adopting blockchain in electronic health record systems, including performance and scalability issues, secure and authorized identification, lack of incentive, and over-and under- usability. Reference [ 5 ] presented a survey in data management for patients that searches the self-sovereign aspect using blockchain. Reference [ 28 ] reviewed the healthcare sector using a blockchain approach from the highest-layer architecture to the lowest-layer algorithms.…”
Section: Related Workmentioning
confidence: 99%