{"id":"https://openalex.org/W4385236519","doi":"https://doi.org/10.1109/eit57321.2023.10187264","title":"Heterogeneity Tolerance in IoT Botnet Attack Classification","display_name":"Heterogeneity Tolerance in IoT Botnet Attack Classification","publication_year":2023,"publication_date":"2023-05-18","ids":{"openalex":"https://openalex.org/W4385236519","doi":"https://doi.org/10.1109/eit57321.2023.10187264"},"language":"en","primary_location":{"id":"doi:10.1109/eit57321.2023.10187264","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/eit57321.2023.10187264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092537775","display_name":"Samuel Kalenowski","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Samuel Kalenowski","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049225181","display_name":"David Arnold","orcid":"https://orcid.org/0000-0002-8781-4095"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Arnold","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109481429","display_name":"M. Gromov","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mikhail Gromov","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018536803","display_name":"Jafar Saniie","orcid":"https://orcid.org/0000-0002-2655-6950"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jafar Saniie","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092537775"],"corresponding_institution_ids":["https://openalex.org/I180949307"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48522934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"353","last_page":"356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8666003942489624},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7709619402885437},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5466079115867615},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5063701868057251},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.48967769742012024},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47440242767333984},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45884406566619873},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4571809768676758},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4282362163066864},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4053266644477844},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.356522798538208},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17056304216384888}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8666003942489624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7709619402885437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5466079115867615},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5063701868057251},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.48967769742012024},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47440242767333984},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45884406566619873},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4571809768676758},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4282362163066864},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4053266644477844},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.356522798538208},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17056304216384888},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit57321.2023.10187264","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/eit57321.2023.10187264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2101109743","https://openalex.org/W2189456526","https://openalex.org/W2733765803","https://openalex.org/W2799758613","https://openalex.org/W2946893466","https://openalex.org/W2962910311","https://openalex.org/W2980576170","https://openalex.org/W2981791596","https://openalex.org/W2998871717","https://openalex.org/W3033403042","https://openalex.org/W3122864121","https://openalex.org/W4283206472","https://openalex.org/W4284887308","https://openalex.org/W4284891397","https://openalex.org/W4287903370","https://openalex.org/W4294284964","https://openalex.org/W4307986628","https://openalex.org/W4308992976","https://openalex.org/W4309224501","https://openalex.org/W7046423450"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W4230913293","https://openalex.org/W2166943775","https://openalex.org/W2775236000","https://openalex.org/W2073762068","https://openalex.org/W2312996858","https://openalex.org/W2392120181","https://openalex.org/W2307276533","https://openalex.org/W2390124310"],"abstract_inverted_index":{"Due":[0],"to":[1,29,43,54,68,77,81,85,128,150,185],"the":[2,30,35,82,90,117,120,129,143,151,168,173,204],"rapid":[3],"adoption":[4],"of":[5,7,15,18,32,109,119,145,213],"Internet":[6],"Things":[8],"(IoT)":[9],"technologies,":[10],"many":[11],"networks":[12],"are":[13,103],"composed":[14],"a":[16,66,146,179,193,207],"patchwork":[17],"devices":[19,64,73,80,166],"designed":[20],"by":[21,56,176],"different":[22],"software":[23],"and":[24,61,71,124,134,182],"hardware":[25],"developers.":[26],"In":[27],"addition":[28],"heterogeneity":[31,118],"IoT":[33],"networks,":[34],"general":[36],"rush-to-market":[37],"produced":[38],"products":[39],"with":[40],"poor":[41],"adherence":[42],"core":[44],"cybersecurity":[45],"principles.":[46],"Coupled":[47],"together,":[48],"these":[49],"weaknesses":[50],"leave":[51],"organizations":[52],"vulnerable":[53],"attack":[55],"botnets,":[57],"such":[58],"as":[59,74],"Mirai":[60],"Gafgyt.":[62],"Infected":[63],"pose":[65],"threat":[67],"both":[69],"internal":[70],"external":[72],"they":[75],"attempt":[76],"add":[78],"new":[79],"collective":[83],"or":[84,92],"perpetrate":[86],"targeted":[87],"attacks":[88],"within":[89],"network":[91,121,135],"against":[93],"third":[94],"parties.":[95],"Artificial":[96],"Intelligence":[97],"(AI)":[98],"tools":[99],"for":[100,106],"intrusion":[101],"detection":[102,123,203],"popular":[104],"platforms":[105],"detecting":[107],"indicators":[108],"botnet":[110],"infiltration.":[111],"However,":[112,199],"when":[113,160,200],"training":[114,177],"AI":[115],"tools,":[116],"hampers":[122],"classification":[125,158,197],"accuracy":[126,159],"due":[127],"differences":[130],"in":[131,167,192,196],"device":[132,181],"architecture":[133],"layout.":[136],"To":[137],"investigate":[138],"this":[139],"challenge,":[140],"we":[141,171],"explored":[142],"application":[144],"Neural":[147],"Network":[148],"(NN)":[149],"N-BaIoT":[152],"dataset.":[153],"The":[154],"NN":[155],"achieved":[156],"94%":[157],"trained":[161],"using":[162],"data":[163,186],"from":[164,187],"all":[165,188],"network.":[169],"Further,":[170],"examined":[172],"model's":[174],"transferability":[175],"on":[178],"single":[180],"applying":[183],"it":[184],"devices.":[189],"This":[190],"resulted":[191],"noticeable":[194],"decline":[195],"accuracy.":[198],"considering":[201],"cyberattack":[202],"model":[205],"retained":[206],"very":[208],"high":[209],"true":[210],"positive":[211],"rate":[212],"99.6%.":[214]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
