Published: May 19, 2024
Language: Английский
Published: May 19, 2024
Language: Английский
Journal of Information Security and Applications, Journal Year: 2025, Volume and Issue: 89, P. 103961 - 103961
Published: Jan. 12, 2025
Language: Английский
Citations
2Alexandria Engineering Journal, Journal Year: 2024, Volume and Issue: 103, P. 88 - 97
Published: June 12, 2024
Language: Английский
Citations
10Knowledge and Information Systems, Journal Year: 2025, Volume and Issue: unknown
Published: Jan. 13, 2025
Language: Английский
Citations
1Computer Science Review, Journal Year: 2024, Volume and Issue: 54, P. 100665 - 100665
Published: Aug. 23, 2024
Language: Английский
Citations
8Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)
Published: July 26, 2024
The Internet of Things (IoT) permeates various sectors, including healthcare, smart cities, and agriculture, alongside critical infrastructure management. However, its susceptibility to malware due limited processing power security protocols poses significant challenges. Traditional antimalware solutions fall short in combating evolving threats. To address this, the research work developed a feature selection-based classification model. At first stage, preprocessing stage enhances dataset quality through data smoothing consistency improvement. Feature selection via Zebra Optimization Algorithm (ZOA) reduces dimensionality, while phase integrates Graph Attention Network (GAN), specifically Dual-channel GAN (DGAN). DGAN incorporates Node Networks Semantic capture intricate IoT device interactions detect anomalous behaviors like botnet activity. model's accuracy is further boosted by leveraging both structural semantic with Sooty Tern (STOA) for hyperparameter tuning. proposed STOA-DGAN model achieves an impressive 99.87% activity classification, showcasing robustness reliability compared existing approaches.
Language: Английский
Citations
6International Journal of Mathematical Engineering and Management Sciences, Journal Year: 2025, Volume and Issue: 10(2), P. 537 - 553
Published: Feb. 7, 2025
Smart technological instruments and Internet of Things (IoT) systems are now targeted by network attacks because their widespread rising use. Attackers can take over IoT devices via botnets, pre-configured attack vectors, use them to do harmful actions. Thus, effective machine learning is required solve these security issues. Additionally, deep with the necessary elements advised defend from threats. In order achieve proper detection hacks in future, relevant datasets must be used. The device's operation could occasionally delayed. sample dataset well structured for training model validating suggested create best protection system feasible detecting cyber risks. This paper focused on analyzing botnet traffic an environment using classifiers: Decision tree classifier, Naïve Bayes, K nearest neighbor, Convolution neural network, Recurrent Random Forest. We calculated each algorithm's Accuracy, True Positive, False Negative, Precision, Recall. obtained impressive results CNN, LSTM RNN classifiers. have also achieved a high rate.
Language: Английский
Citations
0Internet of Things, Journal Year: 2025, Volume and Issue: unknown, P. 101531 - 101531
Published: Feb. 1, 2025
Language: Английский
Citations
0Franklin Open, Journal Year: 2025, Volume and Issue: unknown, P. 100256 - 100256
Published: March 1, 2025
Language: Английский
Citations
0Iran Journal of Computer Science, Journal Year: 2025, Volume and Issue: unknown
Published: April 11, 2025
Language: Английский
Citations
0Knowledge and Information Systems, Journal Year: 2025, Volume and Issue: unknown
Published: April 16, 2025
Language: Английский
Citations
0