Open Access
Issue
E3S Web Conf.
Volume 591, 2024
International Conference on Renewable Energy Resources and Applications (ICRERA-2024)
Article Number 09012
Number of page(s) 11
Section Material Engineering
DOI https://doi.org/10.1051/e3sconf/202459109012
Published online 14 November 2024
  1. Winkler, Ira, and Araceli Treu Gomes. Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies. Syngress, 2016. [Google Scholar]
  2. Grizzard, J.B.; Sharma, V.; Nunnery, C.; Kang, B. B.; Dagon, D. Peer-to-Peer Botnets: Overview and Case Study. In First Workshop on Hot Topics in Understanding Botnets (HotBots 07); USENIX Association: Cambridge, MA, USA, 2007. [Google Scholar]
  3. Beltrán-García, P.; Aguirre-Anaya, E.; Escamilla-Ambrosio, P.J.; Acosta-Bermejo, R. IoT Botnets. In Communications in Computer and Information Science; Springer International Publishing: Merida, Mexico, 2019; pp. 247–257 [CrossRef] [Google Scholar]
  4. Nazir, Ahsan, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, and Muhammad Salman Pathan. “Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets.” Journal of King Saud University-Computer and Information Sciences (2023): 101820. [Google Scholar]
  5. Williams, Phillip, Indira Kaylan Dutta, Hisham Daoud, and Magdy Bayoumi. “A survey on security in internet of things with a focus on the impact of emerging technologies.” Internet of Things 19 (2022): 100564. [CrossRef] [Google Scholar]
  6. Xiong, Lei, and Ye Yao. “Study on an adaptive thermal comfort model with K- nearest-neighbors (KNN) algorithm.” Building and Environment 202 (2021): 108026. [CrossRef] [Google Scholar]
  7. Isnain, Auliya Rahman, Jepi Supriyanto, and Muhammad Pajar Kharisma. “Implementation of K- Nearest Neighbor (K-NN) Algorithm For Public Sentiment Analysis of Online Learning.” IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 2 (2021): 121-130. [CrossRef] [Google Scholar]
  8. Kumar, Ayush, and Teng Joon Lim. “Early detection of Mirai-like IoT bots in large- scale networks through sub- sampled packet traffic analysis.” In Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2, pp. 847-867. Springer International Publishing, 2020. [Google Scholar]
  9. Leevy, Joffrey L., Taghi M. Khoshgoftaar, and John Hancock. “Feature evaluation for IoT botnet traffic classification.” International Journal of Internet of Things and Cyber-Assurance 2, no. 1 (2022): 87-102. [CrossRef] [Google Scholar]
  10. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. “The internet of things: A survey.” Computer networks 54, no. 15 (2010): 2787-2805. [CrossRef] [Google Scholar]
  11. Abed, Ali Ahmed. “Internet of Things (IoT): architecture and design.” In 2016 Al- Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), pp. 1-3. IEEE, 2016. [Google Scholar]
  12. Alam, Tanweer. “A reliable communication framework and its use in internet of things (IoT).” CSEIT1835111| Received 10 (2018): 450-456. [Google Scholar]
  13. Aljohani, Mohammed, and Tanweer Alam. “Real time face detection in ad hoc network of android smart devices.” In International Conference on Computational Intelligence, pp. 245-255. Singapore: Springer Nature Singapore, 2015. [Google Scholar]
  14. Alam, Tanweer. “Fuzzy control based mobility framework for evaluating mobility models in MANET of smart devices.” ARPN Journal of Engineering and Applied Sciences (2017). [Google Scholar]
  15. Singh, Parbhakar, Parveen Kumar, and Tanweer Alam. “Generating different mobility scenarios in ad hoc networks.” International Journal of Electronics Communication and Computer Technology 4, no. 2 (2014): 582-591. [Google Scholar]
  16. Zhang, Hongfei, Li Zhu, Tao Dai, Liwen Zhang, Xi Feng, Li Zhang, and Kaiqi Zhang. “Smart object recommendation based on topic learning and joint features in the social internet of things.” Digital Communications and Networks 9, no. 1 (2023): 22-32. [CrossRef] [Google Scholar]
  17. Bajwa, Junaid, Usman Munir, Aditya Nori, and Bryan Williams. “Artificial intelligence in healthcare: transforming the practice of medicine.” Future healthcare journal 8, no. 2 (2021): e188. [CrossRef] [PubMed] [Google Scholar]
  18. Kasula, Balaram Yadav, and Pawan Whig. “AI-Driven Machine Learning Solutions for Sustainable Development in Healthcare—Pioneering Efficient, Equitable, and Innovative Health Service.” International Journal of Sustainable Development Through AI, ML and IoT 2, no. 2 (2023): 1-7. [Google Scholar]
  19. Miller, Sean, and Curtis Busby-Earle. “The role of machine learning in botnet detection.” In 2016 11th international conference for internet technology and secured transactions (icitst), pp. 359-364. IEEE, 2016. [Google Scholar]
  20. Koroniotis, Nickolaos, Nour Moustafa, Elena Sitnikova, and Jill Slay. “Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques.” In Mobile Networks and Management: 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings 9, pp. 30-44. Springer International Publishing, 2018. [Google Scholar]
  21. Salim, Mikail Mohammed, and Jong Hyuk Park. “Deep Learning based IoT re-authentication for botnet detection and prevention.” In Advanced Multimedia and Ubiquitous Engineering: MUE/FutureTech 2019 13, pp. 239-242. Springer Singapore, 2020. [Google Scholar]
  22. Soe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. “Machine learning- based IoT-botnet attack detection with sequential architecture.” Sensors 20, no. 16 (2020): 4372. [CrossRef] [PubMed] [Google Scholar]
  23. Alharbi, Afnan, and Khalid Alsubhi. “Botnet detection approach using graph- based machine learning.” IEEEAccess 9 (2021): 99166-99180. [Google Scholar]
  24. Rbah, Yahya, Mohammed Mahfoudi, Younes Balboul, Kaouthar Chetioui, Mohammed Fattah, Said Mazer, Moulhime Elbekkali, and Benaissa Bernoussi. “A machine learning based intrusions detection for IoT botnet attacks.” In AIP Conference Proceedings, vol. 2814, no. 1. AIP Publishing, 2023. [Google Scholar]
  25. Soe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, and Kouichi Sakurai. “Machine learning- based IoT-botnet attack detection with sequential architecture.” Sensors 20, no. 16 (2020): 4372. [CrossRef] [PubMed] [Google Scholar]
  26. Popoola, Segun I., Ruth Ande, Bamidele Adebisi, Guan Gui, Mohammad Hammoudeh, and Olamide Jogunola. “Federated deep learning for zero-day botnet attack detection in IoT-edge devices.” IEEE Internet of Things Journal 9, no. 5 (2021): 3930-3944. [Google Scholar]
  27. Alissa, Khalid, Tahir Alyas, Kashif Zafar, Qaiser Abbas, Nadia Tabassum, and Shadman Sakib. “Botnet attack detection in iot using machine learning.” ComputationalIntelligence and Neuroscience 2022 (2022). [Google Scholar]
  28. Abu Al-Haija, Qasem, and Mu’awya Al-Dala’ien. “ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks.” Journal of Sensor and Actuator Networks 11, no. 1 (2022): 18. [CrossRef] [Google Scholar]
  29. Popoola, Segun I., Bamidele Adebisi, Mohammad Hammoudeh, Guan Gui, and Haris Gacanin. “Hybrid deep learning for botnet attack detection in the internet- of- things networks.” IEEE Internet of Things Journal 8,no. 6 (2020): 4944-4956. [Google Scholar]
  30. Alkahtani, Hasan, and Theyazn HH Aldhyani. “Botnet attack detection by using CNN-LSTM model for Internetof Things applications.” Security and Communication Networks 2021 (2021): 1-23. [Google Scholar]
  31. Lin, Kuan-Cheng, Sih-Yang Chen, and Jason C. Hung. “Botnet detection using support vector machines with artificial fish swarm algorithm.” Journal of Applied Mathematics 2014 (2014). [Google Scholar]
  32. Mahardhika, Yesta Medya, Amang Sudarsono, and Ali Ridho Barakbah. “An implementation of Botnet dataset to predict accuracy based on network flow model.” In 2017 International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES- KCIC), pp. 33-39. IEEE, 2017. [Google Scholar]
  33. Niranjan, A., K. M. Akshobhya, P. Deepa Shenoy, and K. R. Venugopal. “EKNIS: Ensemble of KNN, Naïve Bayes Kernel and ID3 for Efficient Botnet Classification Using Stacking.” In 2018 International Conference on Data Science and Engineering (ICDSE), pp. 1-6. IEEE, 2018. [Google Scholar]
  34. Savenko, Oleg, Anatoliy Sachenko, Sergii Lysenko, and George Markowsky. “Botnet Detection Approach for the Distributed Systems.” In 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 406-411. IEEE, 2019. [CrossRef] [Google Scholar]
  35. Bijalwan, Anchit. “Botnet forensic analysis using machine learning.” Security and CommunicationNetworks 2020 (2020): 1-9. [Google Scholar]
  36. Shareena, Jishma, Aiswarya Ramdas, and Haripriya AP. “Intrusion detection system for iot botnet attacks using deep learning.” SN Computer Science 2, no. 3 (2021): 1-8. [CrossRef] [Google Scholar]
  37. Raghavendra, Meghana, and Zesheng Chen. “Detecting IoT Botnets on IoT Edge Devices.” In 2022 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 373-378. IEEE, 2022. [Google Scholar]
  38. Meidan, Yair, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, and Yuval Elovici. “N-baiot—network-based detection of iot botnet attacks using deep autoencoders.” IEEE Pervasive Computing 17, no. 3 (2018): 12-22. [CrossRef] [Google Scholar]
  39. Hussain, Faisal, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, and Ahmad Ali. “Towards a universal features set for IoT botnet attacks detection.” In 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-6. IEEE, 2020. [Google Scholar]
  40. Waqas, Muhammad, Kamlesh Kumar, Asif Ali Laghari, Umair Saeed, Muhammad Malook Rind, Aftab Ahmed Shaikh, Fahad Hussain, Athaul Rai, and Abdul Qayoom Qazi. “Botnet attack detection in Internet of Things devices over cloud environment via machine learning.” Concurrency and Computation: Practice andExperience 34, no. 4 (2022): e6662. [Google Scholar]
  41. Popoola, Segun I., Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh, and Aderemi A. Atayero. “Memory-efficient deep learning for botnet attackdetection in IoT networks.” Electronics 10, no. 9 (2021):1104. [CrossRef] [Google Scholar]
  42. Alqahtani, Mnahi, Hassan Mathkour, and Mohamed Maher Ben Ismail. “IoT botnet attack detection based on optimized extreme gradient boosting and feature selection.” Sensors 20, no. 21 (2020): 6336. [CrossRef] [PubMed] [Google Scholar]
  43. Schmitt, Marc. “Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection.” Journal of Industrial InformationIntegration 36 (2023): 100520. [CrossRef] [Google Scholar]
  44. Khazane, Hassan, Mohammed Ridouani, Fatima Salahdine, and Naima Kaabouch. “A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.” Future Internet 16, no. 1 (2024): 32. [CrossRef] [Google Scholar]
  45. Sharma, Bhisham, Deepika Koundal, Rabie A.Ramadan, and Juan M. Corchado. “Emerging Sensor Communication Network-Based AI/ML Driven Intelligent IoT.” Sensors 23, no. 18 (2023): 7814. [CrossRef] [PubMed] [Google Scholar]
  46. Meziane, Hind, and Noura Ouerdi. “A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems.” Scientific Reports 13, no. 1 (2023): 21255. [CrossRef] [PubMed] [Google Scholar]
  47. Woodiss-Field, Ashley, Michael N. Johnstone, and Paul Haskell-Dowland. “Examination of Traditional Botnet Detection on IoT-Based Bots.” Sensors 24, no. 3 (2024):1027. [CrossRef] [PubMed] [Google Scholar]
  48. Pokhrel, Satish, Robert Abbas, and Bhulok Aryal. “IoT security: botnet detection in IoT using machine learning.” arXiv preprint arXiv:2104.02231 (2021). [Google Scholar]
  49. Singh, N. Joychandra, Nazrul Hoque, Kh Robindro Singh, and Dhruba K. Bhattacharyya. “Botnet‐based IoT network traffic analysis using deep learning.” Security and Privacy (2023): e355. [Google Scholar]
  50. Sharma, Antariksh, 2 Mansotra, and Kuljeet Singh. “Detection of Mirai Botnet Attacks on IoT devices Using Deep Learning.” Journal of Scientific Research and Technology (2023): 174-187 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.