devices and applications is crucial for protecting user
information and privacy.
The proposed methodology introduces a practical
framework for botnet attack detection, combining
Principal Component Analysis (PCA) with SVM,
XGBoost, and AdaBoost. The results demonstrate the
effectiveness of this approach, showcasing high
accuracy, sensitivity, and specificity.
In summary, the article navigates the
transformative impact of the Social IoT, stressing the
need for security in the face of escalating connectivity.
It provides valuable insights into machine learning,
cyber threats, and detection mechanisms, offering
practical solutions for securing the evolving
landscape of the Social IoT.
REFERENCES
Q. Zhang and X. Wang, “SQL injections through back-end
of RFID system,” 2009 International Symposium on
Computer Network and Multimedia Technology, 2009.
doi:10.1109/cnmt.2009.5374533
M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On
technical security issues in cloud computing,” 2009
IEEE International Conference on Cloud Computing,
2009. doi:10.1109/cloud.2009.60
T. Unlu, L. A. Shepherd, N. Coull, and C. McLean, “A
taxonomy of approaches for integrating attack
awareness in applications,” 2020 International
Conference on Cyber Security and Protection of Digital
Services (Cyber Security), 2020.
doi:10.1109/cybersecurity49315.2020.9138885
E. Fernandes, J. Jung, and A. Prakash, “Security analysis of
Emerging Smart Home Applications,” 2016 IEEE
Symposium on Security and Privacy (SP), 2016.
doi:10.1109/sp.2016.44
Y. J. Jia et al., “Contexiot: Towards providing contextual
integrity to appified IOT platforms,” Proceedings 2017
Network and Distributed System Security Symposium,
2017. doi:10.14722/ndss.2017.23051
A. Raghuvanshi et al., “Intrusion detection using machine
learning for risk mitigation in IOT-enabled smart
irrigation in smart farming,” Journal of Food Quality,
vol. 2022, pp. 1–8, 2022. doi:10.1155/2022/3955514
M. Ammar, G. Russello, and B. Crispo, “Internet of things:
A survey on the security of IOT Frameworks,” Journal
of Information Security and Applications, vol. 38, pp.
8–27, 2018. doi:10.1016/j.jisa.2017.11.002
M. A. Al-Shabi, “Design of a network intrusion detection
system using complex deep neuronal networks,”
International Journal of Communication Networks and
Information Security (IJCNIS), vol. 13, no. 3, 2022.
doi:10.17762/ijcnis.v13i3.5148
S. Salaria, S. Arora, N. Goyal, P. Goyal and S. Sharma,
"Implementation and Analysis of an Improved PCA
technique for DDoS Detection," 2020 IEEE 5th
International Conference on Computing
Communication and Automation (ICCCA), 2020, pp.
280-285, doi: 10.1109/ICCCA49541.2020.9250912.
K. S. Sahoo et al., "An Evolutionary SVM Model for DDOS
Attack Detection in Software Defined Networks," in
IEEE Access, vol. 8, pp. 132502-132513, 2020, doi:
10.1109/ACCESS.2020.3009733.
L. Sun, "Application and Improvement of Xgboost
Algorithm Based on Multiple Parameter Optimization
Strategy," 2020 5th International Conference on
Mechanical, Control and Computer Engineering
(ICMCCE), 2020, pp. 1822-1825, doi:
10.1109/ICMCCE51767.2020.00400.
X. Dong, C. Dong, B. Chen, J. Zhong, G. He and Z. Chen,
"Application of AdaBoost Algorithm Based on
Decision Tree in Forecasting Net power of Circulating
Power Plants," 2020 IEEE 4th Information Technology,
Networking, Electronic and Automation Control
Conference (ITNEC), 2020, pp. 747-750, doi:
10.1109/ITNEC48623.2020.9085000.
https://www.kaggle.com/datasets/siddharthm1698/ddos-
botnet-attack-on-iot-devices?resource=download
AI4IoT 2023 - First International Conference on Artificial Intelligence for Internet of things (AI4IOT): Accelerating Innovation in Industry