Results 71 to 80 of about 13,488 (258)
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture †
With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks.
Yan Naung Soe +4 more
semanticscholar +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source
DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK
Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied.
Trần Đắc Tốt +2 more
doaj +1 more source
Fast-Flux Botnet Detection Method Based on Domain Name System Traffic [PDF]
In a botnet,to maintain availability and invisibility of servers,the IP address of Flux-Agent associated with the domain name is changing constantly,and the blacklist policy is no longer effective in preventing Fast-Flux botnet attacks.In order to solve ...
ZUO Xiaojun,DONG Limian,QU Wu
doaj +1 more source
Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone +5 more
wiley +1 more source
The networks of compromised and remotely controlled computers (bots) are widely used in many Internet fraudulent activities, especially in the distributed denial of service attacks. Brute force gives enormous power to bot masters and makes botnet traffic
Jonas Juknius, Antanas Čenys
doaj +1 more source
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar +2 more
wiley +1 more source
Botnet detection remains a critical and challenging area in the field of information security, primarily due to the intricate architectures and sophisticated attack mechanisms employed by botnets.
Florentino Benedictus +4 more
doaj +1 more source
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik +5 more
wiley +1 more source

