Access the full text.
Sign up today, get DeepDyve free for 14 days.
U. Garg, V. Kaushik, A. Panwar, N. Gupta (2021)
Analysis of machine learning algorithms for IoT botnet2021 2nd International Conference for Emerging Technology (INCET)
H. Lan, Y. Pan (2019)
SDN abnormal traffic detection algorithm based on rescaled range analysis2019 Computing, Communications and IoT Applications (ComComAp)
R. Vishwakarma, A.K. Jain (2019)
A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)
E.D. Alalade (2020)
Intrusion detection system in smart home network using artificial immune system and extreme learning machine hybrid approach2020 IEEE 6th World Forum on Internet of Things (WF-IoT)
A.J. Moshayedi, A.S. Roy, L. Liao, S. Li (2019b)
Raspberry Pi SCADA zonal based system for agricultural plant monitoring2019 6th International Conference on Information Science and Control Engineering (ICISCE)
I. Chatterjee (2021)
Artificial intelligence and patentability: review and discussionsInternational Journal of Modern Research, 1
A. Dawod, D. Georgakopoulos, P.P. Jayaraman, A. Nirmalathas (2020)
An IoT-owned service for global IoT device discovery, integration and (re)use2020 IEEE International Conference on Services Computing (SCC)
C.N. Van, V.A. Phan, V.L. Cao, K.D.T. Nguyen (2020)
IoT malware detection based on latent representation2020 12th International Conference on Knowledge and Systems Engineering (KSE)
R. Kumar, G. Dhiman (2021)
A comparative study of fuzzy optimization through fuzzy numberInternational Journal of Modern Research, 1
M. Gheisari, G. Wang, S. Chen, H. Ghorbani (2018a)
Iot-sdnpp: a method for privacy-preserving in smart city with software defined networkingInternational Conference on Algorithms and Architectures for Parallel Processing
G.K. Sahoo, S.A. Patro, P.K. Pradhan, S.K. Das, P. Singh (2020)
An IoT-based intimation and path tracing of a vehicle involved in road traffic crashes2020 IEEE-HYDCON
G.W. Cassales, H. Senger, E.R. de Faria, A. Bifet (2019)
IDSA-IoT: an intrusion detection system architecture for IoT networks2019 IEEE Symposium on Computers and Communications (ISCC)
D. Kim, Y. Pan, J.H. Park (2020)
A study on the digital forensic investigation method of clever malware in IoT devicesIEEE Access, 8
E. Kim, K. Chung, T. Jeong (2017)
Self-certifying ID based trustworthy networking system for IoT smart service domain2017 International Conference on Information and Communication Technology Convergence (ICTC)
J. Koo, Y. Kim (2017)
Interoperability of device identification in heterogeneous IoT platforms2017 13th International Computer Engineering Conference (ICENCO)
R. Hwang, M. Peng, C. Huang, P. Lin, V. Nguyen (2020)
An unsupervised deep learning model for early network traffic anomaly detectionIEEE Access, 8
T. Sharma, R. Nair, S. Gomathi (2022)
Breast cancer image classification using transfer learning and convolutional neural networkInternational Journal of Modern Research, 2
A.J. Moshayedi, A.S. Roy, A. Kolahdooz, Y. Shuxin (2022)
Deep learning application pros and cons over algorithmEAI Endorsed Transactions on AI and Robotics, 1
F. Meneghello, M. Calore, D. Zucchetto, M. Polese, A. Zanella (2019)
IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devicesIEEE Internet of Things Journal, 6
S.K. Shukla, V.K. Gupta, K. Joshi, A. Gupta, M.K. Singh (2022)
Self-aware execution environment model (SAE2) for the performance improvement of multicore systemsInternational Journal of Modern Research, 2
D. Gaifulina, I. Kotenko (2021)
Selection of deep neural network models for IoT anomaly detection experiments2021 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
A. Jayatilaka, Y. Su, D.C. Ranasinghe (2016)
HoTAAL: Home of social things meet ambient assisted living2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)
V.K. Gupta, S.K. Shukla, R.S. Rawat (2022)
Crime tracking system and people’s safety in India using machine learning approachesInternational Journal of Modern Research, 2
M. Gheisari, G. Wang, S. Chen, A. Seyfollahi (2018b)
A method for privacy-preserving in IoT-SDN integration environment2018 IEEE Intl Conference on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)
I. Zavalyshyn, N.O. Duarte, N. Santos (2018)
HomePad: a privacy-aware smart hub for home environments2018 IEEE/ACM Symposium on Edge Computing (SEC)
A.J. Moshayedi, M.S. Hosseini, F. Rezaee (2019a)
WiFi based massager device with NodeMCU through Arduino interpreterJournal of Simulation and Analysis of Novel Technologies in Mechanical Engineering, 11
J. Mitsugi, Y. Sato, M. Ozawa, S. Suzuki (2014)
An integrated device and service discovery with UPnP and ONS to facilitate the composition of smart home applications2014 IEEE World Forum on Internet of Things (WF-IoT)
This strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal evaluation value of the test sample.Design/methodology/approachTo effectively deal with the security threats of botnets to the home and personal Internet of Things (IoT), especially for the objective problem of insufficient resources for anomaly detection in the home environment, a novel kernel density estimation-based federated learning-based lightweight Internet of Things anomaly traffic detection based on nuclear density estimation (KDE-LIATD) method. First, the KDE-LIATD method uses Gaussian kernel density estimation method to estimate every normal sample in the training set. The eigenvalue probability density function of the dimensional feature and the corresponding probability density; then, a feature selection algorithm based on kernel density estimation, obtained features that make outstanding contributions to anomaly detection, thereby reducing the feature dimension while improving the accuracy of anomaly detection; finally, the anomaly evaluation value of the test sample is calculated by the cubic spine interpolation method and anomaly detection is performed.FindingsThe simulation experiment results show that the proposed KDE-LIATD method is relatively strong in the detection of abnormal traffic for heterogeneous IoT devices.Originality/valueWith its robustness and compatibility, it can effectively detect abnormal traffic of household and personal IoT botnets.
International Journal of Pervasive Computing and Communications – Emerald Publishing
Published: Nov 8, 2024
Keywords: Federated learning; Internet of Things; Kernel density estimation; Anomaly detection; Botnets; Feature selection
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.