{"id":"https://openalex.org/W4295308257","doi":"https://doi.org/10.1109/access.2022.3206367","title":"Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks","display_name":"Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4295308257","doi":"https://doi.org/10.1109/access.2022.3206367"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3206367","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3206367","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09888105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09888105.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057087399","display_name":"Belal Ibrahim Hairab","orcid":"https://orcid.org/0000-0002-1321-4740"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Belal Ibrahim Hairab","raw_affiliation_strings":["School of Information Technology and Computer Science, Nile University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Cairo, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088141347","display_name":"Mahmoud Said Elsayed","orcid":"https://orcid.org/0000-0003-2416-7481"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Mahmoud Said Elsayed","raw_affiliation_strings":["School of Computer Science, University College Dublin, Dublin 4, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022546955","display_name":"Anca Delia Jurcut","orcid":"https://orcid.org/0000-0002-2705-1823"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Anca D. Jurcut","raw_affiliation_strings":["School of Computer Science, University College Dublin, Dublin 4, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026193065","display_name":"Marianne A. Azer","orcid":"https://orcid.org/0000-0002-8068-5120"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]},{"id":"https://openalex.org/I4210165434","display_name":"National Telecommunications Institute","ror":"https://ror.org/05g82f642","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210165434"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Marianne A. Azer","raw_affiliation_strings":["School of Information Technology and Computer Science, Nile University, Cairo, Egypt","National Telecommunication Institute, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Cairo, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"National Telecommunication Institute, Cairo, Egypt","institution_ids":["https://openalex.org/I4210165434"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057087399"],"corresponding_institution_ids":["https://openalex.org/I57629906"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":10.5159,"has_fulltext":true,"cited_by_count":76,"citation_normalized_percentile":{"value":0.9877514,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"98427","last_page":"98440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8600454330444336},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8558740019798279},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8427175283432007},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6266319155693054},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5910991430282593},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.443877249956131},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.42817991971969604},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4259267747402191},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.42196279764175415},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3443002700805664},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27649742364883423},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.24782118201255798}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8600454330444336},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8558740019798279},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8427175283432007},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6266319155693054},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5910991430282593},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.443877249956131},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.42817991971969604},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4259267747402191},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.42196279764175415},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3443002700805664},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27649742364883423},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.24782118201255798},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3206367","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3206367","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09888105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d0d20ded8a3547b1a0c8835ac3d8547f","is_oa":true,"landing_page_url":"https://doaj.org/article/d0d20ded8a3547b1a0c8835ac3d8547f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 98427-98440 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3206367","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3206367","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09888105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320858","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4295308257.pdf","grobid_xml":"https://content.openalex.org/works/W4295308257.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W1963882359","https://openalex.org/W2153896900","https://openalex.org/W2789758093","https://openalex.org/W2792498089","https://openalex.org/W2796986051","https://openalex.org/W2804074543","https://openalex.org/W2809254203","https://openalex.org/W2809963016","https://openalex.org/W2887731362","https://openalex.org/W2891335348","https://openalex.org/W2912371425","https://openalex.org/W2921453769","https://openalex.org/W2922073769","https://openalex.org/W2960746948","https://openalex.org/W2962802821","https://openalex.org/W2963683434","https://openalex.org/W2963748489","https://openalex.org/W2968455244","https://openalex.org/W2988790801","https://openalex.org/W2989853335","https://openalex.org/W2995789841","https://openalex.org/W3000883582","https://openalex.org/W3005641848","https://openalex.org/W3011959487","https://openalex.org/W3015807515","https://openalex.org/W3018368568","https://openalex.org/W3023314443","https://openalex.org/W3024340288","https://openalex.org/W3032021129","https://openalex.org/W3039398136","https://openalex.org/W3084346886","https://openalex.org/W3085712007","https://openalex.org/W3089307587","https://openalex.org/W3091945716","https://openalex.org/W3101025102","https://openalex.org/W3106312933","https://openalex.org/W3107888940","https://openalex.org/W3109037541","https://openalex.org/W3117827099","https://openalex.org/W3140854437","https://openalex.org/W3154435685","https://openalex.org/W3168047084","https://openalex.org/W3170077347","https://openalex.org/W3170494183","https://openalex.org/W3175632151","https://openalex.org/W3177795942","https://openalex.org/W3193365863","https://openalex.org/W3200015092","https://openalex.org/W4200494353","https://openalex.org/W4206256378","https://openalex.org/W4210799434","https://openalex.org/W4247200422","https://openalex.org/W4248649664","https://openalex.org/W4285274733","https://openalex.org/W6607259140","https://openalex.org/W6903887332"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W4230824443","https://openalex.org/W2038807247","https://openalex.org/W1599449514","https://openalex.org/W2360429410","https://openalex.org/W2559738661","https://openalex.org/W2204131204","https://openalex.org/W2097156747"],"abstract_inverted_index":{"The":[0,221],"fast":[1],"expansion":[2],"of":[3,6,63,69,74,79,170,211,218,254,258],"the":[4,10,24,44,57,92,102,112,149,168,180,185,192,209,216,219,227,236,241,247,252],"Internet":[5],"Things":[7],"(IoT)":[8],"in":[9,50,96,111,176,191,234,256],"technology":[11],"and":[12,36,84,88,202,213],"communication":[13],"industries":[14],"necessitates":[15],"a":[16,40,119,231],"continuously":[17],"updated":[18],"cyber-security":[19],"mechanism":[20],"to":[21,43,52,59,114,126,137,147,178,207,214,240],"keep":[22],"protecting":[23],"systems\u2019":[25],"users":[26],"from":[27,99],"any":[28],"possible":[29],"attack":[30,157,182],"that":[31,158,187,225],"might":[32],"target":[33],"their":[34],"data":[35],"privacy.":[37],"Botnets":[38],"pose":[39],"severe":[41,94],"risk":[42],"IoT,":[45],"they":[46],"use":[47],"malicious":[48,181],"nodes":[49,55,110],"order":[51,177],"compromise":[53],"other":[54],"inside":[56],"network":[58,113,116,130,193],"launch":[60,115],"several":[61],"types":[62],"attacks":[64,71,90,95,186],"causing":[65],"service":[66],"disruption.":[67],"Examples":[68],"these":[70],"are":[72,91],"Denial":[73,78],"Service":[75,80,82],"(DoS),":[76],"Distributed":[77],"(DDoS),":[81],"Scan,":[83],"OS":[85],"Fingerprint.":[86],"DoS":[87],"DDoS":[89],"most":[93],"IoT":[97],"launched":[98],"Botnets.":[100],"Where":[101],"Botnet":[103],"commands":[104],"previously":[105],"compromised":[106],"single":[107],"or":[108,122,129,139],"multiple":[109],"traffic":[117,183],"towards":[118],"specific":[120,135],"node":[121],"service.":[123],"This":[124],"leads":[125],"computational,":[127],"power,":[128],"bandwidth":[131],"draining,":[132],"which":[133],"causes":[134],"services":[136],"shutdown":[138],"behave":[140],"unexpectedly.":[141],"In":[142,245],"this":[143],"paper,":[144],"we":[145,166],"aim":[146],"verify":[148],"detection":[150,257],"approach":[151],"reliability":[152],"when":[153],"it":[154,159],"encounters":[155],"an":[156],"was":[160],"not":[161],"trained":[162],"on":[163],"before.":[164],"Therefore,":[165],"evaluate":[167],"performance":[169,233],"Convolutional":[171],"Neural":[172],"Networks":[173],"(CNN)":[174],"classifier":[175],"detect":[179],"especially":[184],"never":[188],"reported":[189],"before":[190],"i.e.":[194,200],"Zero-Day":[195],"attacks.":[196],"Different":[197],"regularization":[198,228],"techniques":[199],"L1":[201],"L2":[203],"have":[204],"been":[205],"used":[206],"address":[208],"problem":[210],"overfitting":[212],"control":[215],"complexity":[217],"classifier.":[220],"experimental":[222],"results":[223],"show":[224],"using":[226],"methods":[229],"gives":[230],"higher":[232],"all":[235],"evaluation":[237],"metrics":[238],"compared":[239],"standard":[242],"CNN":[243,249],"model.":[244],"addition,":[246],"enhanced":[248],"technique":[250],"improves":[251],"capability":[253],"IDSs":[255],"unseen":[259],"intrusion":[260],"events.":[261]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":42},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":14}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
