2023
DOI: 10.21203/rs.3.rs-2424464/v2
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Detection of attacks in the Internet of Things with the feature selection approach based on the whale optimization algorithm and learning by majority voting

Abstract: Penetration into the Internet of Things network is a challenge in the security of new-generation networks and smart cities. In most cases, malware is distributed in the Internet of Things and smart objects are infected by malware. Objects infected with malware or viruses, which are called botnets, perform attacks such as DDoS against network services. DDoS attacks make network services inaccessible to users. A suitable approach to detect attacks based on malware and botnet is to use intelligent and distributed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 27 publications
0
0
0
Order By: Relevance