Deep Learning Meets IoT: Hybrid Approaches for Botnet Detection

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2025 | Volume :12 | Issue : 01 | Page : 31-40
By
vector

Sumit Kumar Soni,

vector

Sreeja Nair,

  1. M Tech Scholar, Department of Computer Science, Oriental Institute of Science and Technology, Bhopal, Madhya Pradesh, India
  2. HOD, Department of Computer Science, Oriental Institute of Science and Technology, Bhopal, Madhya Pradesh, India

Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_128825’);});Edit Abstract & Keyword

Rapid advancement in the Internet of Things (IoT) changed everything, making it possible for seamless interconnectivity of devices and altering data-driven decision processes. This study delves into the intersection of IoT with deep learning approaches and hybrid approaches for managing botnet in IoT systems, especially security, efficiency, and performance optimization. Leveraging deep learning models, for example, CNNs and RNNs, will help the network achieve more intrusion detection and data analysis. Additionally, this paper has further discussed how edge and cloud computing can be used for increasing latency and reducing the operational cost and improving data privacy. It also compares different approaches of hybrid security techniques to show how these effectively reduce vulnerabilities in an IoT device. The findings emphasize the potential of integrating deep learning with IoT to develop robust, efficient, and secure systems.

Keywords: IoT, deep learning, edge computing, hybrid techniques, intrusion detection and data privacy

[This article belongs to Recent Trends in Electronics Communication Systems (rtecs)]

How to cite this article:
Sumit Kumar Soni, Sreeja Nair. Deep Learning Meets IoT: Hybrid Approaches for Botnet Detection. Recent Trends in Electronics Communication Systems. 2024; 12(01):31-40.
How to cite this URL:
Sumit Kumar Soni, Sreeja Nair. Deep Learning Meets IoT: Hybrid Approaches for Botnet Detection. Recent Trends in Electronics Communication Systems. 2024; 12(01):31-40. Available from: https://journals.stmjournals.com/rtecs/article=2024/view=0

Full Text PDF

References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_128825’);});Edit

  1. Sadeeq, M. M., Abdulkareem, N. M., Zeebaree, S. R., Ahmed, D. M., Sami, A. S., & Zebari, R. R. (2021). IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal, 1(2), 1-7.
  2. Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Ziörjen, M., & Stiller, B. (2022). Landscape of IoT security. Computer Science Review, 44, 100467.
  3. Laghari, A. A., Wu, K., Laghari, R. A., Ali, M., & Khan, A. A. (2021). A review and state of art of Internet of Things (IoT). Archives of Computational Methods in Engineering, 1-19.
  4. Li, C., Wang, J., Wang, S., & Zhang, Y. (2024). A review of IoT applications in healthcare. Neurocomputing, 565, 127017.
  5. Sattari, F., Farooqi, A. H., Qadir, Z., Raza, B., Nazari, H., & Almutiry, M. (2022). A hybrid deep learning approach for bottleneck detection in IoT. IEEE Access, 10, 77039-77053.
  6. Schöffel, M., Lauer, F., Rheinländer, C. C., & Wehn, N. (2022). Secure IoT in the era of quantum computers—Where are the bottlenecks? Sensors, 22(7), 2484.
  7. Alashhab, A. A., Zahid, M. S. M., Muneer, A., & Abdullahi, M. (2022). Low-rate DDoS attack detection using deep learning for SDN-enabled IoT networks. International Journal of Advanced Computer Science and Applications, 13(11).
  8. Tsimenidis, S., Lagkas, T., & Rantos, K. (2022). Deep learning in IoT intrusion detection. Journal of network and systems management, 30(1), 8.
  9. Jasim, A. D. (2022). A survey of intrusion detection using deep learning in internet of things. Iraqi Journal For Computer Science and Mathematics, 3(1), 83-93.
  10. Lakshmanna, K., Kaluri, R., Gundluru, N., Alzamil, Z. S., Rajput, D. S., Khan, A. A., … & Alhussen, A. (2022). A review on deep learning techniques for IoT data. Electronics, 11(10), 1604.
  11. Tran, M. Q., Elsisi, M., Liu, M. K., Vu, V. Q., Mahmoud, K., Darwish, M. M., … & Lehtonen, M. (2022). Reliable deep learning and IoT-based monitoring system for secure computer numerical control machines against cyber-attacks with experimental verification. IEEE Access, 10, 23186-23197.
  12. Samara, M. A., Bennis, I., Abouaissa, A., & Lorenz, P. (2022). A survey of outlier detection techniques in IoT: Review and classification. Journal of Sensor and Actuator Networks, 11(1), 4.
  13. Abualsauod, E. H. (2022). A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network. Computers and Electrical Engineering, 99, 107847.
  14. Jayalaxmi, P. L. S., Saha, R., Kumar, G., Conti, M., & Kim, T. H. (2022). Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey. IEEE Access, 10, 121173-121192.
  15. Ometov, A., Molua, O. L., Komarov, M., & Nurmi, J. (2022). A survey of security in cloud, edge, and fog computing. Sensors, 22(3), 927.
  16. Rupanetti, D., & Kaabouch, N. (2024). Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities. Applied Sciences, 14(16), 7104.
  17. Laroui, M., Nour, B., Moungla, H., Cherif, M. A., Afifi, H., & Guizani, M. (2021). Edge and fog computing for IoT: A survey on current research activities & future directions. Computer Communications, 180, 210-231.
  18. Rehan, H. (2024). Revolutionizing America’s Cloud Computing the Pivotal Role of AI in Driving Innovation and Security. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 2(1), 239-240.
  19. Fazeldehkordi, E., & Grønli, T. M. (2022). A survey of security architectures for edge computing-based IoT. IoT, 3(3), 332-365.

Regular Issue Subscription Review Article
Volume 12
Issue 01
Received 02/12/2024
Accepted 09/12/2024
Published 24/12/2024