AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges

B Bala, S Behal - Computer science review, 2024 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most
devastating and challenging cyber-attacks. The number of IoT users is growing …

A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB De Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

Security threats, countermeasures, and challenges of digital supply chains

B Hammi, S Zeadally, J Nebhen - ACM Computing Surveys, 2023 - dl.acm.org
The rapid growth of Information Communication Technologies (ICT) has impacted many
fields. In this context, the supply chain has also quickly evolved toward the digital supply …

Survey on smart homes: Vulnerabilities, risks, and countermeasures

B Hammi, S Zeadally, R Khatoun, J Nebhen - Computers & Security, 2022 - Elsevier
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …

Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Given the tremendous success of the Internet of Things in interconnecting consumer
devices, we observe a natural trend to likewise interconnect devices in industrial settings …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the
security model employed to protect user data and prevent devices from engaging in …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

Botnet attack detection by using CNN‐LSTM model for Internet of things applications

H Alkahtani, THH Aldhyani - Security and Communication …, 2021 - Wiley Online Library
The Internet of Things (IoT) has grown rapidly, and nowadays, it is exploited by cyber attacks
on IoT devices. An accurate system to identify malicious attacks on the IoT environment has …