Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
Mir Aman Sheheryar
Department of Computer Science & Engineering, National Institute of Technology, Srinagar, Jammu and Kashmir, India
Search for more papers by this authorCorresponding Author
Sparsh Sharma
Department of Computer Science & Engineering, National Institute of Technology, Srinagar, Jammu and Kashmir, India
Correspondence:
Sparsh Sharma ([email protected])
Search for more papers by this authorMir Aman Sheheryar
Department of Computer Science & Engineering, National Institute of Technology, Srinagar, Jammu and Kashmir, India
Search for more papers by this authorCorresponding Author
Sparsh Sharma
Department of Computer Science & Engineering, National Institute of Technology, Srinagar, Jammu and Kashmir, India
Correspondence:
Sparsh Sharma ([email protected])
Search for more papers by this authorFunding: The authors received no specific funding for this work.
ABSTRACT
The Internet of Things (IoT) has revolutionized how people involve with technological innovations. However, this development has also brought up significant security concerns. The increasing number of IoT attacks poses a serious risk to individuals and businesses equally. In response, this article introduces an ensemble feature engineering method for effective feature selection, based on a systematic behavioral analysis by means of artificial intelligence. This method identifies and highlights the most relevant features from IoT botnet dataset, facilitating accurate detection of both malicious and benign traffic. To detect IoT botnet attacks, the ensemble feature engineering method incorporates distinct approaches, including a genetic algorithm-based genetic approach, filter selection methods such as mutual information, LASSO regularization, and forward-backward search. A merger approach then combines these results, addressing redundancy and irrelevance. As well, a wrapper algorithm called recursive feature removal is applied to further refine the feature selection process. The effectiveness of the selected feature set is validated by means of deep learning algorithms (CNN, RNN, LSTM, and GRU) rooted in artificial intelligence, and applied to the IoT-Botnet 2020 dataset. Results demonstrate encouraging performance, with precision between 97.88% and 98.99%, recall scores between 99.10% and 99.95%, detection accuracy between 98.05% and 99.21%, and an F1-score ranging from 98.45% to 99.82%. Moreover, the ensemble feature engineering approach achieved precision of 98.26%, recall score of 99.68%, detection accuracy of 98.49%, F1-measure of 99.00%, an AUC-ROC of 82.37% and specificity of 98.38%. These outcomes highlight the method's robust performance in identifying both malicious and benign IoT botnet traffic.
Conflicts of Interest
The authors declare no conflicts of interest.
Open Research
Data Availability Statement
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
- 1M. Taddeo, T. McCutcheon, and L. Floridi, “Trusting Artificial Intelligence in Cybersecurity Is a Double-Edged Sword,” Nature Machine Intelligence 1 (2019): 557–560, https://doi.org/10.1038/s42256-019-0109-1.
- 2A. A. Bahashwan, M. Anbar, N. Abdullah, T. Al-Hadhrami, and S. M. Hanshi, “ Review on Common IoT Communication Technologies for Both Long-Range Network (LPWAN) and Short-Range Network,” in Advances on Smart and Soft Computing, ed. F. Saeed, T. Al-Hadhrami, F. Mohammed, and E. Mohammed (Springer Singapore, 2021), 341–353.
10.1007/978-981-15-6048-4_30 Google Scholar
- 3I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, “Anatomy of Threats to the Internet of Things,” IEEE Communications Surveys & Tutorials 21, no. 2 (2018): 1636–1675.
- 4 “Symantec Cybersecurity Threat Report,” https://www.symantec.com.
- 5 Comparitech, “Terrifying Cybercrime & Cybersecurity Statistics,” (2024), https://www.comparitech.com.
- 6 TechJury, “Email Spam Statistics 2024 (How Many Spam Emails are Sent Every Day?),” https://techjury.net.
- 7 Enterprise Networking Planet, “Enterprise Networking Planet Cybersecurity Overview,” https://www.enterprisenetworkingplanet.com.
- 8 “Email Spam Statistics 2024 (How Many Spam Emails are Sent Every Day?),” https://techjury.net.
- 9T. A. Al-Amiedy, M. Anbar, B. Belaton, et al., “A Systematic Literature Review on Attacks Defense Mechanisms in RPL-Based 6LoWPAN of Internet of Things,” Internet of Things 22 (2023): 100741.
- 10Z. Ismail, A. Jantan, M. N. Yusoff, and M. U. Kiru, “The Effects of Feature Selection on the Classification of Encrypted Botnet,” Journal of Computer Virology and Hacking Techniques 17, no. 1 (2021): 61–74, https://doi.org/10.1007/s11416-020-00367-7.
- 11J. Asharf, N. Moustafa, H. Khurshid, E. Debie, W. Haider, and A. Wahab, “A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions,” Electronics 9, no. 7 (2020): 1177.
- 12K. Albulayhi, Q. Abu Al-Haija, S. A. Alsuhibany, A. A. Jillepalli, M. Ashrafuzzaman, and F. T. Sheldon, “IoT Intrusion Detection Using Machine Learning With a Novel High Performing Feature Selection Method,” Applied Sciences 12, no. 10 (2022): 5015.
- 13S. Vanitha and P. Balasubramanie, “Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model,” Intelligent Automation & Soft Computing 36, no. 1 (2023): 849–864, https://doi.org/10.32604/iasc.2023.032324.
- 14M. Asadi, M. A. J. Jamali, A. Heidari, and N. J. Navimipour, “Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies,” Transactions on Emerging Telecommunications Technologies 35, no. 11 (2024): e5056.
- 15L. Li, X. Zhao, J. Fan, F. Liu, N. Liu, and H. Zhao, “A Trustworthy Security Model for IIoT Attacks on Industrial Robots,” Future Generation Computer Systems 153 (2024): 340–349.
- 16U. Iftikhar, K. Asrar, M. Waqas, and S. Abbas, “BOTNETs: A Network Security Issue,” International Journal of Advanced Computer Science and Applications 11 (2020): 432–436, https://doi.org/10.14569/IJACSA.2020.0111155.
- 17S. Ahmad, S. Jha, A. Alam, M. Alharbi, and J. Nazeer, “[Retracted] Analysis of Intrusion Detection Approaches for Network Traffic Anomalies With Comparative Analysis on Botnets (2008–2020),” Security and Communication Networks 2022, no. 1 (2022): 9199703.
10.1155/2022/9199703 Google Scholar
- 18M. A. Haq, “DBoTPM: A Deep Neural Network-Based Botnet Prediction Model,” Electronics 12, no. 5 (2023): 1159.
- 19J. R. Binkley and S. Singh, “An Algorithm for Anomaly-Based Botnet Detection,” in 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 06) (San Jose, CA: USENIX Association, Jul. 2006), https://www.usenix.org/conference/sruti-06/algorithm-anomaly-based-botnet-detection.
- 20S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, “Botnets: A Survey,” Computer Networks 57, no. 2 (2013): 378–403, https://doi.org/10.1016/j.comnet.2012.07.021.
- 21J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and J. Zhang, “Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures,” EURASIP Journal on Wireless Communications and Networking 2009, no. 1 (2009): 692654, https://doi.org/10.1155/2009/692654.
10.1155/2009/692654 Google Scholar
- 22C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, “Consumer, Commercial, and Industrial IoT (In) Security: Attack Taxonomy and Case Studies,” IEEE Internet of Things Journal 9, no. 1 (2021): 199–221.
10.1109/JIOT.2021.3079916 Google Scholar
- 23A. K. Al-Ani, M. Anbar, A. Al-Ani, and D. R. Ibrahim, “Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network,” IEEE Access 8 (2020): 27122–27138.
- 24K. Alieyan, M. M. Kadhum, M. Anbar, S. U. Rehman, and N. K. Alajmi, “An Overview of DDoS Attacks Based on DNS,” paper presented at the 2016 International Conference on Information and Communication Technology Convergence (ICTC), IEEE, 2016, 276–280.
- 25Z. Ahmed, S. M. Danish, H. K. Qureshi, and M. Lestas, “Protecting IoTs From Mirai Botnet Attacks Using Blockchains,” paper presented at the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), IEEE, 2019, 1–6.
- 26M. K. Hasan, T. M. Ghazal, R. A. Saeed, et al., “A Review on Security Threats, Vulnerabilities, and Counter Measures of 5G Enabled Internet-of-Medical-Things,” IET Communications 16, no. 5 (2022): 421–432.
- 27P. Bugata and P. Drotar, “Feature Selection Based on a Sparse Neural-Network Layer With Normalizing Constraints,” IEEE Transactions on Cybernetics 53, no. 1 (2021): 161–172.
- 28S. Saif, N. Yasmin, and S. Biswas, “Feature Engineering Based Performance Analysis of ML and DL Algorithms for Botnet Attack Detection in IoMT,” International Journal of Systems Assurance Engineering and Management 14, no. Suppl 1 (2023): 512–522.
- 29M. Afroz, M. Ibnath, A. Rahman, J. Sultana, and R. Rab, “On Feature Selection Algorithms for Effective Botnet Detection,” Journal of Network and Systems Management 32, no. 2 (2024): 43.
- 30H. Kaur, S. Kumar, and N. Sharma, “Detecting Botnets Based on Statistical Feature Analysis in a Local Enterprise Network,” International Journal of Control Theory and Applications 9, no. 34 (2016): 175–187.
- 31E. Van Der Walt and J. Eloff, “Using Machine Learning to Detect Fake Identities: Bots vs Humans,” IEEE Access 6 (2018): 6540–6549, https://doi.org/10.1109/ACCESS.2018.2796018.
- 32M. Singh, M. Singh, and S. Kaur, “Detecting Bot-Infected Machines Using DNS Fingerprinting,” Digital Investigation 28 (2019): 14–33, https://doi.org/10.1016/j.diin.2018.12.005.
- 33A. Mudgerikar, P. Sharma, and E. Bertino, “E-Spion: A System-Level Intrusion Detection System for IoT Devices,” paper presented at the Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019, 493–500.
- 34D. Li, L. Deng, M. Lee, and H. Wang, “IoT Data Feature Extraction and Intrusion Detection System for Smart Cities Based on Deep Migration Learning,” International Journal of Information Management 49 (2019): 533–545.
- 35A. Bijalwan, “Botnet Forensic Analysis Using Machine Learning,” Security and Communication Networks 2020 (2020): 1–9, https://doi.org/10.1155/2020/9302318.
- 36R. M. Swarna Priya, P. K. Maddikunta, M. Parimala, et al., “An Effective Feature Engineering for DNN Using Hybrid PCA-GWO for Intrusion Detection in IoMT Architecture,” Computer Communications 160 (2020): 139–149.
- 37S. Sriram, R. Vinayakumar, M. Alazab, and K. Soman, “Network Flow Based IoT Botnet Attack Detection Using Deep Learning,” paper presented at the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, 2020, 189–194.
- 38C. Yin, S. Zhang, J. Wang, and N. N. Xiong, “Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series,” IEEE Transactions on Systems, Man, and Cybernetics: Systems 52, no. 1 (2020): 112–122.
10.1109/TSMC.2020.2968516 Google Scholar
- 39B. Wang, Y. Su, M. Zhang, and J. Nie, “A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection,” IEEE Access 8 (2020): 201728–201740.
- 40S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N. Chilamkurti, S. Ganesan, and R. Patan, “Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network,” IEEE Access 8 (2020): 77396–77404.
- 41J. Shareena, A. Ramdas, and H. AP, “Intrusion Detection System for Iot Botnet Attacks Using Deep Learning,” SN Computer Science 2, no. 3 (2021): 1–8.
- 42P. Nimbalkar and D. Kshirsagar, “Feature Selection for Intrusion Detection System in Internet-of-Things (IoT),” ICT Express 7, no. 2 (2021): 177–181.
- 43Z. Ahmad, A. Shahid Khan, K. Nisar, et al., “Anomaly Detection Using Deep Neural Network for IoT Architecture,” Applied Sciences 11, no. 15 (2021): 7050.
- 44T.-T.-H. Le, H. Kim, H. Kang, and H. Kim, “Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method,” Sensors 22, no. 3 (2022): 1154.
- 45M. A. Haq and M. A. R. Khan, “DNNBoT: Deep Neural Network-Based Botnet Detection and Classification,” Computers, Materials and Continua 71, no. 1 (2022): 1729–1750, https://doi.org/10.32604/cmc.2022.020938.
- 46M. M. Alani, “BotStop: Packet-Based Efficient and Explainable IoT Botnet Detection Using Machine Learning,” Computer Communications 193 (2022): 53–62, https://doi.org/10.1016/j.comcom.2022.06.039.
- 47M. Shahhosseini, H. Mashayekhi, and M. Rezvani, “A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data,” Journal of Network and Systems Management 30, no. 3 (2022): 44, https://doi.org/10.1007/s10922-022-09655-7.
- 48B.-X. Wang, J.-L. Chen, and C.-L. Yu, “An AI-Powered Network Threat Detection System,” IEEE Access 10 (2022): 54029–54037, https://doi.org/10.1109/ACCESS.2022.3175886.
- 49M. W. Nadeem, H. G. Goh, Y. Aun, and V. Ponnusamy, “Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques,” IEEE Access 11 (2023): 49153–49171, https://doi.org/10.1109/ACCESS.2023.3277397.
- 50C. A. Fadhilla, M. D. Alfikri, and R. Kaliski, “Lightweight Meta-Learning BotNet Attack Detection,” IEEE Internet of Things Journal 10, no. 10 (2023): 8455–8466, https://doi.org/10.1109/JIOT.2022.3229463.
- 51S. D. A. Rihan, M. Anbar, and B. A. Alabsi, “Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models,” Sensors 23, no. 17 (2023): 7342.
- 52M. A. Hossain and M. S. Islam, “A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection,” Scientific Reports 13, no. 1 (2023): 21207.
- 53M. Nasir, A. R. Javed, M. A. Tariq, M. Asim, and T. Baker, “Feature Engineering and Deep Learning-Based Intrusion Detection Framework for Securing Edge IoT,” Journal of Supercomputing 78, no. 6 (2022): 8852–8866, https://doi.org/10.1007/s11227-021-04250-0.
- 54C. Joshi, R. K. Ranjan, and V. Bharti, “A Fuzzy Logic Based Feature Engineering Approach for Botnet Detection Using ANN,” Journal of King Saud University, Computer and Information Sciences 34, no. 9 (2022): 6872–6882, https://doi.org/10.1016/j.jksuci.2021.06.018.
- 55P. P. Kundu, T. Truong-Huu, L. Chen, L. Zhou, and S. G. Teo, “Detection and Classification of Botnet Traffic Using Deep Learning With Model Explanation,” IEEE Transactions on Dependable and Secure Computing (2022): 1–17.
- 56T. A. Alamiedy, M. Anbar, A. K. Al-Ani, B. N. Al-Tamimi, and N. Faleh, “Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System,” paper presented at the Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), Springer, 2019, 605–619.
- 57I. S. Thaseen, C. A. Kumar, and A. Ahmad, “Integrated Intrusion Detection Model Using Chi-Square Feature Selection and Ensemble of Classifiers,” Arabian Journal for Science and Engineering 44 (2019): 3357–3368.
- 58R. G. Brereton, “Introduction to Analysis of Variance,” Journal of Chemometrics 33, no. 1 (2019): e3018.
- 59D. Gümüşbaş, T. Yıldırım, A. Genovese, and F. Scotti, “A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems,” IEEE Systems Journal 15, no. 2 (2020): 1717–1731.
- 60M. A. F. A. Fida, T. Ahmad, and M. Ntahobari, “Variance Threshold as Early Screening to Boruta Feature Selection for Intrusion Detection System,” paper presented at the 2021 13th International Conference on Information & Communication Technology and System (ICTS), IEEE, 2021, 46–50.
- 61B. Mohammed and E. K. Gbashi, “Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination,” Engineering and Technology Journal 39, no. 7 (2021): 1069–1079.
10.30684/etj.v39i7.1695 Google Scholar
- 62A. Saber, M. Abbas, and B. Fergani, “Two-Dimensional Intrusion Detection System: A New Feature Selection Technique,” paper presented at the 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-Being (IHSH), IEEE, 2021, 69–74.
- 63T. Zhao, Y. Zheng, and Z. Wu, “Feature Selection-Based Machine Learning Modeling for Distributed Model Predictive Control of Nonlinear Processes,” Computers and Chemical Engineering 169 (2023): 108074.
- 64B. Shekar and G. Dagnew, “L1-Regulated Feature Selection and Classification of Microarray Cancer Data Using Deep Learning,” paper presented at the Proceedings of 3rd International Conference on Computer Vision and Image Processing: CVIP 2018, Volume 2, Springer, 2020, 227–242.
- 65O. Kornyo, M. Asante, R. Opoku, et al., “Botnet Attacks Classification in AMI Networks With Recursive Feature Elimination (RFE) and Machine Learning Algorithms,” Computers & Security 135 (2023): 103456.
- 66T. N. Nguyen, Q.-D. Ngo, H.-T. Nguyen, and G. L. Nguyen, “An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics 18, no. 11 (2022): 8298–8306, https://doi.org/10.1109/TII.2022.3152814.
- 67X. Liu and Y. Du, “Towards Effective Feature Selection for IoT Botnet Attack Detection Using a Genetic Algorithm,” Electronics 12, no. 5 (2023): 1260.
- 68J. Velasco-Mata, V. Gonzalez-Castro, E. F. Fernandez, and E. Alegre, “Efficient Detection of Botnet Traffic by Features Selection and Decision Trees,” IEEE Access 9 (2021): 120567–120579, https://doi.org/10.1109/ACCESS.2021.3108222.
- 69V. S. Balusa and K. Srinivas, “An Effective Intrusion Detection System for Edge Computing Using ConvNeXt and ResNet152V2,” International Journal of Computational Intelligence and Applications 23, no. 3 (2024): 2450014.
10.1142/S1469026824500147 Google Scholar
- 70M. A. Haq, M. A. R. Khan, and T. AL-Harbi, “Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing,” Computers, Materials & Continua 71, no. 1 (2022): 1769–1788, https://doi.org/10.32604/cmc.2022.018708.
- 71D. Zhao, I. Traore, B. Sayed, et al., “Botnet Detection Based on Traffic Behavior Analysis and Flow Intervals,” Computers & Security 39 (2013): 2–16, https://doi.org/10.1016/j.cose.2013.04.007.
- 72Y. Meidan, M. Bohadana, Y. Mathov, et al., “N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders,” IEEE Pervasive Computing 17, no. 3 (2018): 12–22, https://doi.org/10.1109/MPRV.2018.03367731.
- 73V. H. Bezerra, V. G. T. da Costa, R. A. Martins, S. B. Junior, R. S. Miani, and B. B. Zarpelao, “Providing IoT Host-Based Datasets for Intrusion Detection Research,” paper presented at the Anais Do XVIII Simpósio Brasileiro de Segurança da Informaçao e de Sistemas Computacionais, SBC, 2018, 15–28.
- 74H. Kang, D. H. Ahn, G. M. Lee, J. Yoo, K. H. Park, and H. K. Kim, “IoT Network Intrusion Dataset,” IEEE Dataport 10 (2019): q70p-q449.
- 75N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset,” Future Generation Computer Systems 100 (2019): 779–796, https://doi.org/10.1016/j.future.2019.05.041.
- 76E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos, and P. Burnap, “A Supervised Intrusion Detection System for Smart Home IoT Devices,” IEEE Internet of Things Journal 6, no. 5 (2019): 9042–9053, https://doi.org/10.1109/JIOT.2019.2926365.
- 77A. Guerra-Manzanares, J. Medina-Galindo, H. Bahsi, and S. Nõmm, “MedBIoT: Generation of an IoT Botnet Dataset in a Medium-Sized IoT Network,” paper presented at the ICISSP, 2020, 207–218.
- 78A. Parmisano, S. Garcia, and M. Erquiaga, “A Labeled Dataset With Malicious and Benign IoT Network Traffic,” Stratos. Lab. Praha Czech Repub, 2020.
- 79I. Vaccari, G. Chiola, M. Aiello, M. Mongelli, and E. Cambiaso, “MQTTset, a New Dataset for Machine Learning Techniques on MQTT,” Sensors 20, no. 22 (2020): 6578.
- 80H. Hindy, E. Bayne, M. Bures, R. Atkinson, C. Tachtatzis, and X. Bellekens, “Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset),” paper presented at the International Networking Conference, Springer, 2020, 73–84.
- 81A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, “TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access 8 (2020): 165130–165150.
- 82M. Zago, M. G. Pérez, and G. M. Pérez, “UMUDGA: A Dataset for Profiling DGA-Based Botnet,” Computers & Security 92 (2020): 101719.
- 83I. Ullah and Q. H. Mahmoud, “A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks,” paper presented at the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE, 2020, 134–140.
- 84P. Szumelda, N. Orzechowski, M. Rawski, and A. Janicki, “Vhs-22–a Very Heterogeneous Set of Network Traffic Data for Threat Detection,” paper presented at the Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference, 2022, 72–78.
- 85M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning,” IEEE Access 10 (2022): 40281–40306.
- 86M. Singh, M. Singh, and S. Kaur, “TI-16 DNS Labeled Dataset for Detecting Botnets,” IEEE Access 11 (2023): 62616–62629, https://doi.org/10.1109/ACCESS.2023.3287141.
- 87T. A. Tuan, N. V. Anh, T. T. Luong, and H. V. Long, “UTL_DGA22-a Dataset for DGA Botnet Detection and Classification,” Computer Networks 221 (2023): 109508.
- 88R. Li, Q. Li, Y. Huang, W. Zhang, P. Zhu, and Y. Jiang, “IoTEnsemble: Detection of Botnet Attacks on Internet of Things,” paper presented at the European Symposium on Research in Computer Security, Springer, 2022, 569–588.
- 89H. R. Sayegh, W. Dong, and A. M. Al-madani, “Enhanced Intrusion Detection With LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data,” Applied Sciences 14, no. 2 (2024): 479.
- 90A. A. Wardana, P. Sukarno, and M. Salman, “Collaborative Botnet Detection in Heterogeneous Devices of Internet of Things Using Federated Deep Learning,” paper presented at the Proceedings of the 2024 13th International Conference on Software and Computer Applications, 2024, 287–291.
- 91S. Bagui and K. Li, “Resampling Imbalanced Data for Network Intrusion Detection Datasets,” Journal of Big Data 8, no. 1 (2021): 6.
- 92S. I. Popoola, B. Adebisi, R. Ande, M. Hammoudeh, K. Anoh, and A. A. Atayero, “SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks,” Sensors 21, no. 9 (2021): 2985, https://doi.org/10.3390/s21092985.
- 93N. A. Hikal and M. Elgayar, “Enhancing IoT Botnets Attack Detection Using Machine Learning-IDS and Ensemble Data Preprocessing Technique,” in Internet of Things—Applications and Future: Proceedings of ITAF 2019, Springer, 2020, 89–102.
- 94R. Vinayakumar, M. Alazab, S. Srinivasan, Q.-V. Pham, S. K. Padannayil, and K. Simran, “A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities,” IEEE Transactions on Industry Applications 56, no. 4 (2020): 4436–4456.
- 95S. Taheri, M. Salem, and J.-S. Yuan, “Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection,” Big Data and Cognitive Computing 2, no. 4 (2018): 1–16, https://doi.org/10.3390/bdcc2040037.
10.3390/bdcc2040037 Google Scholar
- 96M. A. Haq, “SMOTEDNN: A Novel Model for Air Pollution Forecasting and AQI Classification,” Computers, Materials & Continua 71, no. 1 (2022): 1403–1425, https://doi.org/10.32604/cmc.2022.021968.
- 97N. F. Almujahid, M. A. Haq, and M. Alshehri, “Comparative Evaluation of Machine Learning Algorithms for Phishing Site Detection,” PeerJ Computer Science 10 (2024): e2131.
- 98Y. Akhiat, K. Touchanti, A. Zinedine, and M. Chahhou, “IDS-EFS: Ensemble Feature Selection-Based Method for Intrusion Detection System,” Multimedia Tools and Applications 83 (2024): 12917–12937.
- 99T. Wu, Y. Hao, B. Yang, and L. Peng, “ECM-EFS: An Ensemble Feature Selection Based on Enhanced Co-Association Matrix,” Pattern Recognition 139 (2023): 109449.
- 100J. Kim, J. Kim, H. Kim, M. Shim, and E. Choi, “CNN-Based Network Intrusion Detection Against Denial-of-Service Attacks,” Electronics 9, no. 6 (2020): 916.
- 101A. K. Sahu, S. Sharma, M. Tanveer, and R. Raja, “Internet of Things Attack Detection Using Hybrid Deep Learning Model,” Computer Communications 176 (2021): 146–154.
- 102F. Pallasdies, P. Norton, J.-H. Schleimer, and S. Schreiber, “Neural Optimization: Understanding Trade-Offs With Pareto Theory,” Current Opinion in Neurobiology 71 (2021): 84–91.
- 103M. A. Haq, A. K. Jilani, and P. Prabu, “Deep Learning Based Modeling of Groundwater Storage Change,” Computers, Materials & Continua 70 (2021): 4599–4617.
- 104M. A. Haq, “CDLSTM: A Novel Model for Climate Change Forecasting,” Computers, Materials & Continua 71, no. 2 (2022): 2363–2381, https://doi.org/10.32604/cmc.2022.023059.
- 105M. Abadi, P. Barham, J. Chen, et al., “{TensorFlow}: A System for {Large-Scale} Machine Learning,” paper presented at the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), 2016, 265–283.
- 106A. Gulli and S. Pal, Deep Learning With Keras (Packt Publishing Ltd, 2017).
- 107Y. Bai, Z. Zhou, and X. Li, “Dynamic Computation Offloading Leveraging Horizontal Task Offloading and Service Migration in Edge Networks,” paper presented at the International Conference on Blockchain and Trustworthy Systems, Springer, 2023, 63–76.