=Paper= {{Paper |id=Vol-3156/paper31 |storemode=property |title=Machine Learning Based Techniques for Cyberattacks Detection in the Internet of Things Infrastructure |pdfUrl=https://ceur-ws.org/Vol-3156/paper31.pdf |volume=Vol-3156 |authors=Kira Bobrovnikova,Sergii Lysenko,Ivan Hurman,Andrzej Kwiecień |dblpUrl=https://dblp.org/rec/conf/intelitsis/BobrovnikovaLHK22 }} ==Machine Learning Based Techniques for Cyberattacks Detection in the Internet of Things Infrastructure== https://ceur-ws.org/Vol-3156/paper31.pdf
Machine Learning Based Techniques for Cyberattacks Detection
in the Internet of Things Infrastructure
Kira Bobrovnikovaa, Sergii Lysenkoa, Ivan Hurmana, and Andrzej Kwiecieńb
a
    Khmelnytskyi National University, Institutska str., 11, Khmelnytskyi, 29016, Ukraine
b
    Silesian University of Technology, Poland

                 Abstract
                 The emergence of the concept of the Internet of Things has revolutionized many economic
                 sectors and areas of human activity. At the same time, the spread of the Internet of Things
                 has led to the emergence of cyber security risks in those areas of human activity for which
                 cyber security problems were not relevant before. Most of the security problems in IoT
                 infrastructure arise from a lack of basic security controls. In particular, open ports, security
                 issues with the protocols used in the IoT infrastructure, outdated applications and
                 components of IoT devices, lack of automatic firmware updates for smart devices (or no
                 update releases at all), insecure update mechanisms, insecure settings (by default), weak
                 passwords, vulnerabilities in software and web applications, direct network connection to the
                 Internet, insecure authentication methods. Exploitation of vulnerabilities in routers, storage
                 systems, access control and other IoT devices contributes to the spread of malicious software
                 in the IoT infrastructure and compromising IoT devices. The low level of security of IoT
                 devices leads to the fact that a large number of such devices can be compromised with a high
                 degree of probability and used as a means to carry out various attacks both inside and outside
                 the IoT infrastructure. Attacks on IoT infrastructure result in device hacking, data theft,
                 financial loss, instability, or even physical damage to devices. In turn, given the specific
                 nature of these hacked IoT devices, damage to them can lead to injury to people working or
                 dependent on these devices. At the same time, the owners of hacked IoT devices indirectly
                 become accomplices in cyber-crimes. The article provides an overview of known methods
                 for detecting cyber-attacks on the infrastructure of the Internet of things based on machine
                 learning methods. Despite the large number of such approaches, the problem of detecting
                 zero-day cyber-attacks in the IoT infrastructure is still unresolved. This leads to the need to
                 find new approaches that can solve this problem.

                 Keywords 1
                 Internet of Things (IoT), cyberattack, distributed denial of services (DDoS), cyberattack
                 detection, cybersecurity

    1. Introduction
    The Internet of Things is one of the most versatile technologies that allow innovations to be
introduced into various economic sectors and areas of human activity, including critical infrastructure
facilities and the industrial Internet of Things. At the same time, the infrastructure of the Internet of
things can simultaneously include both devices that are used for office automation and devices for
operational technologies. IoT devices in these infrastructures can impact mission-critical systems
(such as database servers) through the ability to collect and monitor IoT system data. Even if a smart
device is highly specialized or has limited resources to pose a threat, there is always a risk that this

IntelITSIS’2022: 3rd International Workshop on Intelligent Information Technologies and Systems of Information Security, March 23–25,
2022, Khmelnytskyi, Ukraine
EMAIL: bobrovnikova.kira@gmail.com (K. Bobrovnikova); sirogyk@ukr.net (S. Lysenko); devastator167384@gmail.com (I. Hurman);
andrzej.kwiecien@polsl.pl (A. Kwiecień)
ORCID: 0000-0002-1046-893X (K. Bobrovnikova); 0000-0001-7243-8747 (S. Lysenko); 0000-0002-2282-3484 (I. Hurman); 0000-0003-
1447-3303 (A. Kwiecień)
            ©️ 2022 Copyright for this paper by its authors.
            Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
            CEUR Workshop Proceedings (CEUR-WS.org)
device will be used to hack into more important components of the IoT infrastructure. The severity
and strength of this impact depends on the environment in which insecure IoT devices are installed
[1].
   Weak or even no security for IoT devices leaves smart devices more vulnerable than servers and
computers. This is facilitated by the constant availability of smart devices on the network, the lack of
automatic firmware updates for smart devices (or the lack of update releases at all), and the lack of
awareness of users about potential cyber security risks.
   IoT devices are easily vulnerable to outdated or untrusted components, insecure update
mechanisms, insecure default settings, weak passwords, use of insecure network services such as
Telnet and SSH, or insecure services (such as web-based management consoles). Security issues in
the protocols used in the IoT infrastructure can have a devastating effect on the entire infrastructure.
Vulnerabilities in software and web applications can be used to distribute malicious updates and steal
credentials.
   Thus, the critical components in the infrastructure of the Internet of Things can be both the smart
devices themselves and the communication channels and software [2].

 2. Cyber Security Risks and Threats to Internet of Things Infrastructure
   Cybersecurity risks in IoT infrastructure are exacerbated by a number of key factors inherent in
IoT (Figure 1). Although these factors increase the functionality of the IoT infrastructure, at the same
time, they are critical from a security point of view [1].
   Security issues in the IoT infrastructure also have specific features. For example, an IoT system
may consist of groups of identical or similar devices. Device homogeneity amplifies the potential
impact of each possible vulnerability by multiplying it by the number of similar devices that have the
same characteristics. For example, a vulnerability in a device communication protocol when
connected to the Internet of Things could spread to other devices using the same protocol or having an
identical design.




Figure 1: Key factors influencing cyber security risks in IoT infrastructure

   Deployment of IoT devices can occur under conditions that make it impossible or difficult to
further upgrade or reconfigure devices. In addition, IoT devices may be left without manufacturer
support in the long run. In such a situation, the security mechanisms in place at the time of
deployment may be unusable as new threats emerge in the future. This will introduce new
vulnerabilities. Thus, the technical support and management of IoT devices in the long term is a
serious security issue.
   Another specific IoT security issue is that the user may often be unaware of the internal
functioning of an IoT device or the data streams it generates. This creates vulnerability where an IoT
device can perform unwanted actions without the user's knowledge, such as collecting data that the
user does not intend to provide. The functionality of an IoT device can also change without the user's
knowledge through device firmware updates, leaving the user at risk from any changes made by the
device manufacturer.
   Threats to the IoT infrastructure can be divided into the following categories [3]: spoofing,
information disclosure, tampering, elevation of service and Distributed Denial of Service (DDoS)
(Figure 2). Attackers typically use these threats as an entry point and then move on to other malicious
activities such as stealing data, blocking connections, or infecting devices with ransomware.




Figure 2: Threats to IoT infrastructure

    One of the most common threats to IoT infrastructure is a Distributed Denial of Service attack [4,
5]. One of the common goals of DDoS attacks is the task of "putting down" a service, which leads to a
loss of profit for the owner. The purpose of this type of attack is often online stores, banks, and
gaming services. The duration of such attacks can last from several hours to several days with a
powerful amount of traffic that reaches a terabit of data. Attacks on individuals, the purpose of which
is to break into home devices and servers, also remain relevant for attackers. However, organizations
are most often attacked through smart things, while the number of attacks through home IoT devices
has decreased somewhat. Because industrial IoT devices are often isolated from the outside world,
these smart devices are less susceptible to attacks. Often, DDoS attacks are not intended to “destroy”
important infrastructure components, but serve only as a distraction to hide the real attack. When
trying to break into the DDoS infrastructure, the attack is launched in parallel with the true attack [6].

 3. Machine Learning-Based Solution for IoT Cyber-Attacks Detection
    There are many approaches to solving cybersecurity problems [7, 8], including the detection of
cyber-attacks on the infrastructure of the Internet of Things (Table 1). One of the most promising
approaches to detect attacks in the field of cybersecurity is algorithms based on machine learning [9-
13]. Іn particular, in the paper [14] an approach based on IoT malware traffic analysis, using
multilevel artificial intelligence was proposed. This approach applies a combination of neural network
and a binary visualization and learns from the misclassifications to improve its efficiency.
    The approach consists of three stages: collection of network traffic; a binary visualization stage in
which the collected traffic is stored in ASCII and converted to a 2D image; processing and analysis of
this binary image by the TensorFlow module. TensorFlow is an end-to-end open source platform for
solving machine learning problems to automatically find and classify patterns. The advantage of the
platform is the ease of retraining and the excellent ability of image recognition, including detecting
differences that are inaccessible to the human eye. The TensorFlow module is built on top of a CNN,
with an additional layer at the beginning called a convolution.
    The approach uses an algorithm for visual representation of the collected traffic, based on binary
data visualization tool Binvis. Thus, the result of Binvis is the representation of the characteristics of
network traffic in the form of an image. The binary output of Binvis is broken into a number of tiles.
The TensorFlow machine learning algorithm predicts what each of the tiles represents, and then
determines the combination of tiles on which the image is based. This allows parallelizing operations
and detecting an object regardless of its location in the image. The proposed technique makes it
possible to protect IoT devices on gateway level bypassing the limitations of IoT environment.
    The paper [15] presents a deep learning based intrusion detection system (DL-IDS) for IoT
infrastructure. According to the proposed approach, in order to detect intrusions into the infrastructure
of the Internet of Things based on the analysis of network traffic, the collected traffic is pre-processed
to normalize it and eliminate uncertainties in the data set. To replace missing values and eliminate
redundancy, the similarity of the data in the dataset is measured using the Minkowski distance. Based
on the distance between each data pair, redundant and duplicate data is removed from the dataset and
passed to the next preprocessing step. At the next stage, in order to avoid bias of the classification
results towards more frequent entries, the missing attribute values in the data set are replaced by the
computed values of the nearest neighbor. For this purpose, the K nearest neighbors in Euclidean
distance are determined, and the missing values are replaced by the average values for the obtained
data. To select the most important traffic features that may indicate the fact of an intrusion into the
Internet of Things environment, the spider monkey optimization algorithm (SMO) was used. In order
to detect intrusions into the IoT environment, a stacked-deep polynomial network (SDPN) was used
to classify incoming data as normal or abnormal. Anomalous data may indicate an intrusion into the
IoT environment, such as the presence of a user-to-root (U2R) attack, a remote-to-local (R2L) attack,
a denial of service (DoS) attack, a probe attack. In [16] an AD-IoT system for detecting cyber-attacks
on fog computing nodes in the smart city infrastructure is proposed. AD-IoT system is based on
Random Forest machine learning algorithm and makes it possible to detect compromised IoT devices
that are located in distributed fog nodes. The determination of normal and abnormal device behavior
is based on the monitoring and analysis of network traffic that passes through each of the fog nodes. If
fog level attacks are detected, the system informs the cloud security services about the results
obtained and the system updates made. The results of the experiments showed that the proposed
system makes it possible to achieve an acceptable accuracy in detecting attacks on the smart city
infrastructure. In [17] experimental studies and a comprehensive analysis of twelve different machine
learning algorithms were carried out in order to assess the accuracy of detecting anomalous behavior
in Internet of Things networks using these algorithms. The results obtained show that for all the
applied datasets, the Random Forest algorithm has the best performance in terms of Receiver
Operating Characteristic (ROC) curves, Precision, Recall, F1-Score and Accuracy. It is also
concluded that other studied machine learning algorithms demonstrate efficiency quite close to
Random Forest. The choice of machine learning algorithm depends on the data to be analyzed.
    In the work [18] an approach based on the paradigm of software-defined networks (SDN) and
cloud technologies is proposed. Decentralized two-layer SDN is used to detect and mitigate DDoS
attacks in the wireless IoT environment. The local domain controller of that domain is used to control
traffic for each subnet domain. At the same time, a universal controller connected to local controllers
is located in the cloud environment. Local controllers collect traffic from their domains and extract
many features from it to detect the presence of DDoS attacks in the domain. To detect DDoS attacks,
155 features were used, removed using the SPAN (switched port analyzer) function of the Cisco
Nexus switch. Among these features are: frame.time_epoch, frame.interface_id, frame.len,
radiotap.length, radiotap.pad, wlan.fc.frag, wlan.frag, wlan.duration, data.len.
    The collected features are used by the DDoS detection modules implemented on all local
controllers. In order to detect DDoS attacks, an extreme learning machine (ELM), which is a feed-
forward neural network, and semi-supervised learning were used. The advantage of using ELM is the
reduction of training time by randomly selecting the initial parameters, as well as the use of simple
matrix operations. This makes it possible to accelerate retraining and thereby perform real-time
detection. A DDoS attacks mitigation module is also deployed on local controllers. The universal
controller is used to provide data exchange between local controllers, such as local blacklists
generated by local domain controllers. The proposed DDoS mitigation approach defines separate
strategies that define different attack mitigation scenarios for mobile and fixed devices in the wireless
Internet environment.
    The work [19] is devoted to the study of the effectiveness of the use of machine learning classifiers
in anomaly-based IDS for the infrastructure of the Internet of things. The efficiency and possibilities
of using several single classifiers and their ensembles were investigated. To evaluate the performance
of the classifiers, such characteristics as accuracy, error rates, specificity, sensitivity, and areas under
the ROC curve were used. In order to conduct a statistical analysis of significant differences for the
classifiers, the Nemenya and Friedman tests were applied. The response time of the classifiers was
also evaluated when applied in a specific IoT environment as part of the IDS. Based on the
performance evaluation and statistical analysis, it was concluded that extreme gradient boosting,
regression trees and classification trees are characterized by the most acceptable classification
efficiency and response times. In [20] the effectiveness of using several machine learning classifiers
to analyze botnet traffic in the IoT environment was analyzed. To this end, datasets for several types
of botnet attacks were classified for nine IoT devices. For each of the analyzed classifiers, such
characteristics as Accuracy, Precision, Recall, True Positive, True Negative, False Positive, False
Negative and F1-score were calculated. The results of the experimental studies have shown that the
best results are demonstrated by the use of Random Forest, and the lowest - by the use of Support
Vector Machine. At the same time, the obtained rather high F1-scores show the reliability of all three
studied classifiers. The disadvantage of the technique is the use of all available features in datasets for
analysis. In the article [21] an intelligent system for the IoT cyber-attack detection in the IoT network
is presented. The system is based on using a hybrid approach to reduce the set of features. For this
purpose, feature ranking on the basis of using correlation coefficient, mean decrease accuracy of
random forest and gain ratio is performed. Thus, three different feature sets are formed. The resulting
features are then combined using a specially designed technique to obtain an optimized set of features.
The resulting feature set was processed by machine learning algorithms such as K-Nearest Neighbor,
Random Forest and XGBoost. BoT-IoT, DS2OS and NSL-KDD datasets were used for conducting
experiments to evaluate the effectiveness of the approach. The performance of the system was
evaluated and compared with some known methods found in the literature in terms of Detection Rate,
Accuracy, Precision and F1-score. In [22] a method for detecting DDoS attacks based on hybrid
optimization is proposed. The method uses a hybrid Metaheuristic lion optimization algorithm and
Firefly optimization algorithm (ML-F). The collected data is pre-processed to remove noise and fill in
missing data. Features that may indicate the presence of attacks are extracted from the processed data
by applying Recursive feature elimination (RFE). Data separation based on hybrid ML-F optimization
algorithm allows selecting low rate attacks. In order to classify attacks, a random forest classifier is
used. Using the proposed approach allows us to improve performance compared to the gradient boost
classifier algorithm. In the study [23] a Local-Global best Bat Algorithm for Neural Networks
(LGBA-NN) to select feature sets and hyperparameters for efficient botnet attacks detection was
proposed. For this purpose, 9 commercial IoT devices infected with Gafgyt and Mirai botnets were
used.The presented Bat Algorithm (BA) used the local-global best-based inertia weight to update the
velocity of bat in the swarm. In the population initialization Gaussian distribution was used to tackle
with swarm diversity of algorithm. With purpose to obtain better exploration during each generation,
the local search mechanism was followed by the Gaussian density function and local-global best
function. Improved algorithm was employed for neural network hyperparameter tuning and weight
optimization to classify 10 classes of botnet attacks. The performance of LGBA-NN was compared
with other new approaches such as weight optimization using BA-NN and Particle Swarm
Optimization (PSO-NN). The experimental results revealed the superiority of the proposed technique
(with 90% accuracy) over other techniques, i.e., BA-NN (accuracy of 85.5%) and PSO-NN (accuracy
of 85.2% ) in botnet attack detection. In the paper [24] architecture for detecting DoS/DDoS attacks in
IoT using machine learning methods is presented. The proposed architecture includes DoS/DDoS
attack detection and DoS/DDoS mitigation. To detect DoS/DDoS attacks, a multiclass classifier based
on the concept of "Looking back" was used. The detection component makes it possible to determine
the type of attack and the type of packet used in the attack. This allows appropriate mitigation
measures to be taken against attacks using specific packet types.
   The work [25] introduces an intrusion detection technique which used an ensemble-based voting
classifier that combines multiple classifiers as a base learner. In order to get the final prediction,
presented classifier gives the vote to the predictions of the traditional classifier. To evaluate the
effectiveness of the proposed technique, experiments are performed on a set of different IoT devices
such as fridge sensor, garage door, GPS sensor, modbus, light motion, thermostat and weather. The
proposed technique was tested for binary and multi-class attacks classification (such as Password,
Scanning, XSS, DDos, Ransomeware, Injection, Backdoor).
   The performance of the proposed technique has been compared with the other new intrusion
detection algorithms available in the literature. A comparison has been drawn against the matrices of
accuracy, precision, recall and F-score with different combinations of Decision Tree, Naive Bayes,
Random Forest, and K-Nearest Neighbours machine learning algorithms: DT-RF-kNN-NB, DT-RF-
NB, and DT-RF-kNN. The evaluation result showed that the proposed method is more efficient in
most cases.

Table 1
Efficiency, data sets and machine learning algorithms of modern techniques to detecting cyber-
attacks in the Internet of Things infrastructure
      Authors        Year          Goal          Machine Learning    Data set         Result
                                                      methods
      R. Shire,     2019 detection and Convolutional Neural             real       Accuracy of
   S. Shiaeles,               classification          Network        network         91.32%,
   K. Bendiab,                   zero-day            and binary      environ-      Precision of
    B. Ghita &                   malware            visualization     ments          91.67%,
 N. Kolokotronis                                                                Recall of 91.03%
        [14]
    Y. Otoum,       2019      detection of         Stacked‐Deep      NSL-KDD       Accuracy of
      D. Liu &                DoS, user-to-          Polynomial                 99.02%, Precision
  A. Nayak [15]                root (U2R),            Network                       of 99,4%,
                            remote-to-local                                      Recall of 98,3%,
                              (R2L), probe,                                        F1-score of
                                intrusions                                            98,8%
    I. Alrashdi,    2019      anomaly and         Random Forest      UNSW-      Precision of 79%,
   A. Alqazzaz,                   attack                               NB15      Recall of 97%,
     E. Aloufi,                 detection                                        F1-score of 86%
   R. Alharthi,
   M. Zohdy &
  H. Ming [16]
   N. Elmrabit,     2020      anomaly and          Decision Tree,    CICIDS-     Performance at
      F. Zhou,                    attack          Random Forest,       2017,     up to 99.9% for
       F. Li, &                 detection      Adaptive boosting, K-  ICS Cy-    Random Forest
   H. Zhou [17]                                 Nearest Neighbours, berat-tack,         on
                                                Logistic Regression, UNSW-         CICIDS-2017
                                                Naive Bayes, Simple    NB15
                                                 Recurrent Neural
                                                  Network, Gated
                                                  Recurrent Units,
                                               Convo-lutional Neural
                                                 Network and Long
                                               short-Term Memory,
                                               Convolu-tional Neural
                                               Network, Long short-
                                               Term Memory, Deep
    Authors         Year        Goal           Machine Learning       Data set         Result
                                                    methods
                                                 Neural Network
    N. Ravi &       2020  DDoS attacks           Semi-supervised     UNB-ISCX      Accuracy up to
 S. M. Shalinie           detection and         Extreme Learning                      96,28%
       [18]                 mitigation            Machines, ELM
 A. Verma & V.      2020 research on the        Classification and   CIDDS-001,   Regression Trees,
   Ranga [19]             effectiveness         Regression Trees,      UNSW-         Classification
                           of using ML              Multilayer         NB15,           Trees and
                          classifiers for     Perceptron, Random      NSL-KDD     Extreme Gradient
                             anomaly            Forest, Extremely                   Boosting show
                            detection-         Randomized Trees,                  the best results -
                           based IDS to       AdaBoost, Gradient                      Accuracy of
                            detect DoS         Boosted Machine,                   96.7%, Specificity
                              attacks           Extreme Gradient                       of 96.2%,
                                                    Boosting                         Sensitivity of
                                                                                     97.3%, with
                                                                                      acceptable
                                                                                    response time
   S. Bagui,        2021      intrusion         Support Vector          UCI        Accuracy of 99%
  X. Wang &                   detection        Machine, Logistic      Machine
 S. Bagui [20]                                Regression, Random      Learning
                                                    Forest           Repository
P. Kumar, G. P.     2021    cyber-attack       Random Forest, K-      NSL-KDD,     Accuracy above
  Gupta, & R.               detection for      Nearest Neighbor,      BoT-IoT,     99%, Detection
 Tripathi [21]              IoT network            XGBoost             DS2OS       Rate up to 90%-
                                                                                         100%
E. S. Krishna, A.   2021    DDoS attacks        Random Forest        NSL-KDD,        Accuracy of
Thangavelu [22]              detection                                NBaIoT      99.98%, Precision
                                                                                  of 99.87%, Recall
                                                                                    of 100% and F-
                                                                                   score of 99.73%

 A. Alharbi, W.     2021    DDoS attacks         Bat Algorithm        N-BaIoT        Accuracy of
  Alosaimi, H.               detection                                                  90%
 Alyami, H. T.
   Rauf, & R.
 Damaševičius
      [23]
M. A. Khan, M.      2022      intrusion       combined Decision       TON IoT     Accuracy of 88%,
A. Khan Khattk,               detection        Tree, Naive Bayes,                 Precision of 90%,
                                                                                    Recall of 88%,
 S. Latif, A. A.                              Random Forest, and                   F-score of 88%
  Shah, M. Ur                                      K-Nearest                          for DT-RF-
  Rehman, W.                                  Neighbours using a                    NB with Binary
Boulila, ... & J.                                 voting-based                     classification on
                                                                                    combined IoT
  Ahmad [24]                                       technique                            dataset
A. Mihoub, O. B.    2022   investigation of     Looking-Back-         IoT-Bot        Accuracy of
    Fredj, O.                 DoS/DDoS         enabled Random                          99.81%
 Cheikhrouhou,                 attacks              Forest
A. Derhab & M.              detection for
    Authors        Year         Goal          Machine Learning        Data set          Result
                                                 methods
  Krichen [25]              IoT using ML
                             techniques

   Figures 3-6 demonstrate the results of the analyzed cyberattack detection approaches concerning
the Internet of Things infrastructure in terms of Accuracy, Recall, Precision and F-score.




Figure 3: Results of the analyzed cyberattack detection approaches concerning the Internet of Things
infrastructure in terms of Accuracy




Figure 4: Results of the analyzed cyberattack detection approaches concerning the Internet of Things
infrastructure in terms of Recall




Figure 5: Results of the analyzed cyberattack detection approaches concerning the Internet of Things
infrastructure in terms of Precision

 4. Conclusions
    The paper provides an overview of machine learning approaches to detecting attacks in the IoT
infrastructure. Known methods for detecting attacks demonstrate a high level of efficiency, at the
same time, they have a number of common limitations and shortcomings, as evidenced by the
constant increase in the number of cyber-attacks on the IoT infrastructure. The main disadvantages of
known techniques are the inability to detect and adaptively respond to still unknown attacks (zero-day
attacks), as well as the low level of detection of multi-vector attacks. In addition, many well-known
approaches are characterized by a high level of false positives. A common disadvantage of most of
the known approaches is a significant response time, which is unacceptable for real-time systems.
Another important disadvantage of the known approaches is the need for significant amounts of
computing resources. Also, an important aspect that requires special attention is the selection of a
minimum and at the same time sufficient set of informative features that indicate the presence of
attacks in the IoT infrastructure. Thus, there is still a need to develop new techniques for detecting
attacks in the IoT infrastructure that will take into account the shortcomings of known approaches and
improve the accuracy of detecting known and unknown attacks in the IoT infrastructure.




Figure 6: Results of the analyzed cyberattack detection approaches concerning the Internet of Things
infrastructure in terms of F-score

 5. References
    [1] Trend Micro. The IoT Attack Surface: Threats and Security Solutions. URL:
        https://www.trendmicro.com/vinfo/mx/security/news/internet-of-things/the-iot-attack-surface-
        threats-and-security-solutions
    [2] V. Kharchenko, Y. Ponochovnyi, A. Boyarchuk, & A. S. Qahtan. Security and availability
        models for smart building automation systems. International Journal of Computing, 2017, 16
        (4), pp. 194-202.
    [3] Tackle      IoT     application     security    threats     and    vulnerabilities.   URL:
        https://www.techtarget.com/iotagenda/tip/Tackle-IoT-application-security-threats-and-
        vulnerabilities
    [4] K. Singh, K. S. Dhindsa, & B. Bhushan. Performance analysis of agent based distributed
        defense mechanisms against DDOS attacks. International Journal of Computing, 2018, 17 (1),
        pp. 15-24.
    [5] A. Balyk, M. Karpinski, A. Naglik, G. Shangytbayeva, I. Romanets. Using Graphic Network
        Simulator 3 for DDoS Attacks Simulation. International Journal of Computing, 2017, 16
        (4), pp. 219-225.
    [6] 2022 IoT and OT threat landscape assessment report. URL: https://sectrio.com/iot-security-
        reports/2022-iot-and-ot-threat-landscape-assessment-report/
    [7] O. Kehret, A. Walz, A. Sikora. Integration of Hardware Security Modules into a Deeply
        Embedded TLS Stack. International Journal of Computing, 2016, 15 (1), pp. 24-32.
    [8] W. Winiecki, P. Bilski. Implementation of Symmetric Cryptography in Embedded
        Measurement Systems. International Journal of Computing, 2015, 14 (2), pp. 66-76.
    [9] S. Lysenko, O. Pomorova, O. Savenko, A. Kryshchuk and K. Bobrovnikova. DNS-based
        Anti-evasion Technique for Botnets Detection. Proceedings of the 8-th IEEE International
    Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology
    and Applications, Warsaw (Poland), September 24–26, 2015, pp. 453–458
[10] B. Savenko, S. Lysenko, K. Bobrovnikova, O. Savenko, G. Markowsky. Detection DNS
    Tunneling Botnets. Proceedings of the 2021 IEEE 11th International Conference on
    Intelligent Data Acquisition and Advanced Computing Systems: Technology and
    Applications, Cracow, Poland, September 22-25, 2021, Vol. 1, pp. 64-69. IEEE
[11] S. Lysenko, K. Bobrovnikova, R. Shchuka, O. Savenko. A cyberattacks detection technique
    based on evolutionary algorithms. In 2020 IEEE 11th International Conference on
    Dependable Systems, Services and Technologies (DESSERT), 2020, pp. 127-132. IEEE.
[12] G. Suchacka, J. Iwariski. Identifying legitimate Web users and bots with different traffic
    profiles - an Information Bottleneck approach. Knowledge-Based Systems, 2020,197, 10587S
[13] T. Sochor, N. Chalupova. Interpersonal Internet Messaging Prospects in Industry 4.0 Era. In:
    Recent Advances in Soft Computing and Cybernetics. Springer, Cham, 2021. p. 285-295.
[14]R. Shire, S. Shiaeles, K. Bendiab, B. Ghita, N. Kolokotronis. Malware squid: A novel iot
    malware traffic analysis framework using convolutional neural network and binary
    visualisation. In Internet of Things, Smart Spaces, and Next Generation Networks and
    Systems, Springer, Cham, 2019, pp. 65-76.
[15] Y. Otoum, D. Liu & A. Nayak. DL‐IDS: a deep learning-based intrusion detection
    framework for securing IoT. Transactions on Emerging Telecommunications Technologies,
    2019, e3803.
[16] I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy & H. Ming. Ad-iot: Anomaly
    detection of iot cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual
    Computing and Communication Workshop and Conference (CCWC), IEEE, 2019, pp. 0305-
    0310.
[17] N. Elmrabit, F. Zhou, F. Li, & H. Zhou. Evaluation of machine learning algorithms for
    anomaly detection. In 2020 International Conference on Cyber Security and Protection of
    Digital Services (Cyber Security), IEEE, 2020, pp. 1-8.
[18] N. Ravi & S. M. Shalinie. Learning-driven detection and mitigation of DDoS attack in IoT
    via SDN-cloud architecture. IEEE Internet of Things Journal, 2020, 7(4), pp. 3559-3570.
[19] A. Verma & V. Ranga. Machine learning based intrusion detection systems for IoT
    applications. Wireless Personal Communications, 2020, 111(4), pp. 2287-2310.
[20] S. Bagui, X. Wang & S. Bagui. Machine Learning Based Intrusion Detection for IoT Botnet.
    International Journal of Machine Learning and Computing, 2021, 11(6).
[21] P. Kumar, G. P. Gupta, & R. Tripathi. Toward design of an intelligent cyber-attack detection
    system using hybrid feature reduced approach for IoT networks. Arabian Journal for Science
    and Engineering, 2021, 46(4), pp. 3749-3778.
[22] E. S. Krishna, A. Thangavelu. Attack detection in IoT devices using hybrid metaheuristic
    lion optimization algorithm and firefly optimization algorithm. International Journal of
    System Assurance Engineering and Management, 2021, pp. 1-14.
[23] A. Alharbi, W. Alosaimi, H. Alyami, H. T. Rauf, & R. Damaševičius. Botnet attack
    detection using local global best bat algorithm for industrial internet of things. Electronics,
    10(11), 2021, p.1341.
[24] M. A. Khan, M. A. Khan Khattk, S. Latif, A. A. Shah, M. Ur Rehman, W. Boulila, ... & J.
    Ahmad. Voting classifier-based intrusion detection for IoT networks. In Advances on Smart
    and Soft Computing, Springer, Singapore. 2022, pp. 313-328.
[25] A. Mihoub, O. B. Fredj, O. Cheikhrouhou, A. Derhab & M. Krichen. Denial of service
    attack detection and mitigation for internet of things using looking-back-enabled machine
    learning techniques. Computers & Electrical Engineering, 2022, 98, p. 107716.
[26] K. Bobrovnikova, S. Lysenko, B. Savenko, P. Gaj, O. Savenko. Technique for IoT malware
    detection based on control flow graph analysis. Radioelectronic and Computer Systems,
    2022(1), pp. 141–153.
[27] IoT dataset. URL: https://github.com/thieu1995 /iot dataset (accessed 10.02.2022).