2022
DOI: 10.3390/electronics11040556
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning-Based Darknet Traffic Detection System for IoT Applications

Abstract: The massive modern technical revolution in electronics, cognitive computing, and sensing has provided critical infrastructure for the development of today’s Internet of Things (IoT) for a wide range of applications. However, because endpoint devices’ computing, storage, and communication capabilities are limited, IoT infrastructures are exposed to a wide range of cyber-attacks. As such, Darknet or blackholes (sinkholes) attacks are significant, and recent attack vectors that are launched against several IoT co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
36
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
4
1

Relationship

6
4

Authors

Journals

citations
Cited by 88 publications
(38 citation statements)
references
References 58 publications
2
36
0
Order By: Relevance
“…e classifiers in machine learning scenario can be classified as traditional ANN-based classifiers, which are Multilayer Perceptron (MLP), Extremelearning Machine (ELM) [1], and Ensemble learning [25]. In the case of ANN, the neural networks combine the behavior of different species behavior with machine learning tasks.…”
Section: Classifiersmentioning
confidence: 99%
“…e classifiers in machine learning scenario can be classified as traditional ANN-based classifiers, which are Multilayer Perceptron (MLP), Extremelearning Machine (ELM) [1], and Ensemble learning [25]. In the case of ANN, the neural networks combine the behavior of different species behavior with machine learning tasks.…”
Section: Classifiersmentioning
confidence: 99%
“…For more efficient, scalable, and secured blockchain industrial uses, additional work in the future is required. For instance, it will be interesting to investigate how machine learning (ML) techniques [ 175 , 176 , 177 ] may be used in the context of blockchain technology to increase security levels and the performances of blockchain-based systems. It will also be extremely useful to apply some formal testing techniques for blockchain-based solutions to improve their quality and increase their robustness [ 178 , 179 , 180 ].…”
Section: Discussionmentioning
confidence: 99%
“…Specifically, the dividerand algorithm works as illustrated in Figure 3 below. In addition, to ensure optimum validation/testing process, we also applied k-fold cross-validation [33] during the learning process. In this approach, the dataset is arbitrarily split into k laminated folds, with each fold used as a test/validate dataset once while the other folds are consolidated together for use as a training dataset for the machine learning model generation.…”
Section: Data Distribution Process (Ddp)mentioning
confidence: 99%