DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

An integrated exploration on internet of things and wireless sensor networks

S Sharma, VK Verma - Wireless Personal Communications, 2022 - Springer
The ability to access data from remote locations is meant possible with the help of computer
networks. These networks may be wired or wireless. Modern improvements in wireless …

An intelligent DDoS attack detection tree-based model using Gini index feature selection method

MA Bouke, A Abdullah, SH ALshatebi… - Microprocessors and …, 2023 - Elsevier
Cyber security has recently garnered enormous attention due to the popularity of the Internet
of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …

[HTML][HTML] Detecting IoT attacks using an ensemble machine learning model

V Tomer, S Sharma - Future Internet, 2022 - mdpi.com
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things
(IoT) devices in homes, offices, transportation, healthcare, and other locations. By …

[HTML][HTML] SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

BukaGini: a stability-aware Gini index feature selection algorithm for robust model performance

MA Bouke, A Abdullah, J Frnda, K Cengiz… - Ieee …, 2023 - ieeexplore.ieee.org
Feature interaction is a vital aspect of Machine Learning (ML) algorithms, and gaining a
deep understanding of these interactions can significantly enhance model performance …

A fast instance reduction algorithm for intrusion detection scenarios

V Herrera-Semenets, R Hernández-León… - Computers and …, 2022 - Elsevier
We live in a world that is being driven by data. This leads to challenges of extracting and
analyzing knowledge from large volumes of data. An example of such a challenge is …

Distributed Denial of Services (DDoS) Botnet Attack Prevention in Internet of Things (IoT) Devices Using AI

K Garg, KS Gill, R Chauhan, D Rawat… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The expeditious adoption of Internet of Things (IoT) devices has facilitated the emergence of
complex cybersecurity risks, notably Distributed Denial of Service (DDoS) botnet assaults …

[Retracted] Construction of a Public Service Cloud Platform for Disabled People Based on the Big Data Management Model of the Internet of Things

X Liu, G Chang - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
With the continuous development of social economy and the continuous improvement of
people's ideological level, the state and social people have given more and more care and …

Information security management for cyber security challenges in smart cities security and privacy

A Othman - 2022 - search.proquest.com
Abstract Information security management universally needed and has become popular in
our digital world. A growing proportion of human activities, such as social interactions …