2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) 2023
DOI: 10.1109/icscds56580.2023.10104633
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Botnet Traffic using Deep Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…That is why CNN and LSTM have been selected as DL models to detect intrusion in IoMT. The Equation (11) shows that CNN's role is exclusive in this experiment.…”
Section: Model Selectionmentioning
confidence: 89%
See 1 more Smart Citation
“…That is why CNN and LSTM have been selected as DL models to detect intrusion in IoMT. The Equation (11) shows that CNN's role is exclusive in this experiment.…”
Section: Model Selectionmentioning
confidence: 89%
“…While this methodology achieves 98.34% accuracy, it detects only Botnet attacks. The Botnet attacks are usually made through sequential data [11]. An LSTM or BiLSTM network is enough to detect this attack accurately [12].…”
Section: Related Workmentioning
confidence: 99%
“…DL algorithms have a limited range of applications due to their computational complexity and data requirements [74]. Furthermore, because of their tendency for overfitting, DL may perform excellently on training data but poorly on new or untested data [75].…”
Section: Deep Learning Overviewmentioning
confidence: 99%