Results 51 to 60 of about 13,488 (258)
A Two-fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks
The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of Things (IoT) environment that initiates with scanning activity and ends at the distributed denial of service (DDoS) attack.
Faisal Hussain +7 more
semanticscholar +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Scalability Optimization of Virtualization Based Botnet Emulation Platform
Botnet emulation,a new technology to investigate Botnet characteristics,gains increasing focus.The practical virtualization based Botnet emulation platform is few and lacks support of rapid deployment,multiple virtualization,specific features of the ...
Li Ruan, Bo Lin, Limin Xiao
doaj +2 more sources
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment
Cyber attacks are growing with the rapid development and wide use of internet technology. Botnet attack emerged as one of the most harmful attacks. Botnet identification is becoming challenging due to the numerous attack vectors and the ongoing evolution
Mudasir Ali +5 more
semanticscholar +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Mobile botnets are gaining popularity with the expressive demand of smartphone technologies. Similarly, the majority of mobile botnets are built on a popular open source OS, e.g., Android. A mobile botnet is a network of interconnected smartphone devices intended to expand malicious activities, for example; spam generation, remote access, information ...
Ahmad Karim, Victor Chang, Ahmad Firdaus
openaire +2 more sources
An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques [PDF]
Ali Soleymani, Fatemeh Arabgol
openalex +1 more source

