Review of filtering based feature selection for Botnet detection in the Internet of Things

被引:0
作者
Saied, Mohamed [1 ]
Guirguis, Shawkat [1 ]
Madbouly, Magda [1 ]
机构
[1] Univ Alexandria, Alexandria, Egypt
关键词
Internet of Things; Botnet detection system; Artificial intelligence; Feature selection; Deep learning; INTRUSION DETECTION; IOT; DATASET; ATTACK;
D O I
10.1007/s10462-025-11113-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Botnets are a major security threat in the Internet of Things (IoT), posing significant risks to user privacy, network availability, and the integrity of IoT devices. With the increasing availability of large datasets that contain hundreds or even thousands of variables, selecting the right set of features can be a challenging task. Feature selection is a critical step in developing effective machine learning-based botnet detection systems, as it enables the selection of a subset of features that are most relevant for detection. This paper provides a comprehensive review of filtering based feature selection techniques for botnet detection in IoT. It examines a range of filtering based techniques and evaluates their effectiveness in addressing the challenges and limitations of botnet detection in IoT. It aims to identify the gaps in the literature and areas for future research, and discuss the broader implications of findings for the field of IoT botnet detection. This review provides valuable insights and guidance for researchers and practitioners working on botnet detection in IoT, and highlights the importance of effective feature selection in developing robust and reliable detection systems.
引用
收藏
页数:49
相关论文
共 96 条
  • [21] Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
    Aminanto, Muhamad Erza
    Kim, Kwangjo
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 136 - 147
  • [22] [Anonymous], 2016, Journal of Mathematical Sciences: Advances and Applications, V37, P51, DOI DOI 10.18642/JMSAA_7100121627
  • [23] Aslan O, 2022, Inf Technol J, V15, P149, DOI [10.17671/gazibtd.1002178, DOI 10.17671/GAZIBTD.1002178]
  • [24] Aysa MH, 2020, 4 INT S MULT STUD IN, P1
  • [25] Bahsi H, 2018, I C CONT AUTOMAT ROB, P1857, DOI 10.1109/ICARCV.2018.8581205
  • [26] Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection
    Balhareth, Ghaida
    Ilyas, Mohammad
    [J]. SENSORS, 2024, 24 (17)
  • [27] The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems
    Balla, Asaad
    Habaebi, Mohamed Hadi
    Elsheikh, Elfatih A. A.
    Islam, Md. Rafiqul
    Suliman, F. M.
    [J]. SENSORS, 2023, 23 (02)
  • [28] Bhavsar M., 2023, Discover Internet of Things, V3, DOI DOI 10.1007/S43926-023-00034-5
  • [29] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Castaneda, Angel Luis Munoz
    Mata, Jose Antonio Aveleira
    Alaiz-Moreton, Hector
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 5281 - 5296
  • [30] A survey on feature selection methods
    Chandrashekar, Girish
    Sahin, Ferat
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 16 - 28