The recent growth of the Internet of Things (IoT) has resulted in a rise in IoT based DDoS attacks. This paper presents a solution to the detection of botnet activity within consumer IoT devices and networks. A novel application of Deep Learning is used to develop a detection model based on a Bidirectional Long Short Term Memory based Recurrent Neural Network (BLSTM-RNN). Word Embedding is used for text recognition and conversion of attack packets into tokenised integer format. The developed BLSTM-RNN detection model is compared to a LSTM-RNN for detecting four attack vectors used by the mirai botnet, and evaluated for accuracy and loss. The paper demonstrates that although the bidirectional approach adds overhead to each epoch and increase...
Internet of Things (IoT) devices are increasingly deployed in different industries and for different...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
An IoT botnet detection model is designed to detect anomalous attack traffic utilised by the mirai b...
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of ...
Detecting botnet and malware cyber-attacks is a critical task in ensuring the security of computer n...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Internet of Things (IoT) is one of the most rapidly evolving technologies nowadays. It has its impac...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
Internet of Things (IoT) devices are increasingly deployed in different industries and for different...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
An IoT botnet detection model is designed to detect anomalous attack traffic utilised by the mirai b...
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of ...
Detecting botnet and malware cyber-attacks is a critical task in ensuring the security of computer n...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Deep Learning (DL) is an efficient method for botnet attack detection. However, the volume of networ...
Internet of Things (IoT) is one of the most rapidly evolving technologies nowadays. It has its impac...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
Internet of Things (IoT) devices are increasingly deployed in different industries and for different...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...
Cyber attackers exploit a network of compromised computing devices, known as a botnet, to attack Int...