{"id":"https://openalex.org/W7139912556","doi":"https://doi.org/10.1016/j.procs.2026.01.062","title":"Enhancing IoT Security Using Machine Learning for Port Scan Attack Detection","display_name":"Enhancing IoT Security Using Machine Learning for Port Scan Attack Detection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139912556","doi":"https://doi.org/10.1016/j.procs.2026.01.062"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.01.062","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.062","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.01.062","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130234524","display_name":"Omar Almomani","orcid":null},"institutions":[{"id":"https://openalex.org/I104941359","display_name":"Al-Ahliyya Amman University","ror":"https://ror.org/00xddhq60","country_code":"JO","type":"education","lineage":["https://openalex.org/I104941359"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Omar Almomani","raw_affiliation_strings":["Department of Networks and Cybersecurity, Al-Ahliyya Amman University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Networks and Cybersecurity, Al-Ahliyya Amman University, Amman, Jordan","institution_ids":["https://openalex.org/I104941359"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013947060","display_name":"Ammar Almomani","orcid":"https://orcid.org/0000-0002-8808-6114"},"institutions":[{"id":"https://openalex.org/I119744171","display_name":"Higher Colleges of Technology","ror":"https://ror.org/00qmy9z88","country_code":"AE","type":"education","lineage":["https://openalex.org/I119744171"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ammar Almomani","raw_affiliation_strings":["Department of Computer Information Science, Higher Colleges of Technology, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information Science, Higher Colleges of Technology, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I119744171"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113850038","display_name":"Shahzad Memon","orcid":null},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shahzad Memon","raw_affiliation_strings":["Department of Computer Science and Digital Technologies, Faculty of Architecture Computing and Engineering, University of East London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Digital Technologies, Faculty of Architecture Computing and Engineering, University of East London, UK","institution_ids":["https://openalex.org/I157227730"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5130234524"],"corresponding_institution_ids":["https://openalex.org/I104941359"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93496174,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"275","issue":null,"first_page":"532","last_page":"540"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.11379999667406082,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.11379999667406082,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10689999908208847,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.08649999648332596,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6952999830245972},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.5508000254631042},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.262800008058548}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8914999961853027},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6952999830245972},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.5508000254631042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5268999934196472},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4878999888896942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3418999910354614},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3086000084877014},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26570001244544983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.262800008058548},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24660000205039978}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.01.062","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.062","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.01.062","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.062","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W3024594074","https://openalex.org/W3155885603","https://openalex.org/W4403941556","https://openalex.org/W4404300986","https://openalex.org/W4405062066","https://openalex.org/W4407452573","https://openalex.org/W4407597636","https://openalex.org/W4407637189","https://openalex.org/W4407682192","https://openalex.org/W4407775092","https://openalex.org/W4408993848","https://openalex.org/W4410045251","https://openalex.org/W4410732296","https://openalex.org/W4410783850","https://openalex.org/W4411122038","https://openalex.org/W4411266576","https://openalex.org/W4411880743","https://openalex.org/W4411880879","https://openalex.org/W4411889381","https://openalex.org/W4412676680","https://openalex.org/W4412880009","https://openalex.org/W4413434826","https://openalex.org/W4414084277","https://openalex.org/W4414184213","https://openalex.org/W4414559421","https://openalex.org/W4415129759","https://openalex.org/W4415246455","https://openalex.org/W4415618655"],"related_works":[],"abstract_inverted_index":{"The":[0,186],"fast":[1],"proliferation":[2],"of":[3,6,14,105,133,136,139,143,172,188],"the":[4,11,72,115,124,130,159,170,198,213],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9,18],"facilitated":[10],"highest":[12],"levels":[13],"connectivity,":[15],"but":[16],"also":[17,148],"created":[19],"severe":[20],"weaknesses,":[21],"especially":[22],"reconnaissance":[23,210],"attacks,":[24,41],"including":[25],"host":[26],"and":[27,42,75,92,109,117,141,154,158],"operating":[28],"system":[29],"(OS)":[30],"port":[31,68],"scanning.":[32],"Such":[33],"attacks":[34],"provide":[35],"gateway":[36],"to":[37,47,51,66,177,197,208],"even":[38],"more":[39],"sophisticated":[40,173],"therefore":[43],"it":[44],"is":[45,112],"crucial":[46],"detect":[48,67],"them":[49],"early":[50],"ensure":[52],"IoT":[53,184,214],"infrastructures":[54],"are":[55,120],"secured.":[56],"This":[57],"paper":[58],"suggests":[59],"a":[60,193],"framework":[61],"that":[62,114,204],"could":[63],"be":[64,206],"used":[65,99],"scanning":[69],"based":[70],"on":[71],"IoTID20":[73],"dataset":[74],"implemented":[76],"with":[77,127,150,164],"machine":[78],"learning.":[79],"Eight":[80],"classifiers,":[81,126],"including,":[82],"XGBoost,":[83],"Random":[84],"Forest,":[85],"Bagging,":[86],"AdaBoost,":[87],"Gradient":[88],"Boosting,":[89],"CatBoost,":[90],"LightGBM":[91,128],"Support":[93],"Vector":[94],"Machine":[95],"(SVM)":[96],"have":[97],"been":[98],"in":[100,103,182,212],"comparative":[101],"analysis":[102],"terms":[104],"Accuracy,":[106],"Precision,":[107],"Recall,":[108],"F1-score.":[110],"It":[111],"demonstrated":[113],"boosting":[116],"ensemble":[118,174],"models":[119,176],"much":[121],"better":[122],"than":[123],"traditional":[125],"demonstrating":[129],"best":[131],"accuracy":[132,161],"99.90%,":[134],"precision":[135],"99.91%,":[137],"recall":[138],"99.87%":[140],"F1-score":[142],"99.89%.":[144],"Near-perfect":[145],"detection":[146,202],"was":[147,162],"observed":[149,163],"bagging":[151],"(99.87%":[152],"accuracy)":[153,157],"CatBoost":[155],"(99.84%":[156],"lowest":[160],"SVM":[165],"(98.37%).":[166],"These":[167],"results":[168],"highlight":[169],"power":[171],"learning":[175],"identify":[178],"complex":[179],"attack":[180],"patterns":[181],"high-dimensional":[183],"traffic.":[185],"combination":[187],"these":[189],"strategies":[190],"can":[191],"offer":[192],"very":[194],"strong":[195],"backbone":[196],"next":[199],"generation":[200],"intrusion":[201],"systems":[203],"will":[205],"able":[207],"overcome":[209],"threat":[211],"networks":[215]},"counts_by_year":[],"updated_date":"2026-03-22T06:25:25.174409","created_date":"2026-03-21T00:00:00"}
