Intrusion Detection for Internet of Things

Authors : P. Rajashekhar; Y. Thrinay Chowdary; Ziaul Haque Choudhury

Volume/Issue : Volume 7 - 2022, Issue 6 - June

Google Scholar :

Scribd :


In military systems, the Internet of Things (IoT) usually consists of many Internet-connected devices and terminals. Cyber thieves, particularly state backing or national state actors, are the major targets. Vector malware is a typical attack. We provide a detailed explanation in this article. The Internet of Things (IoT) is a means for turning into use the device's operational code (Opcode) sequencing, you may turn the Internet into a malevolent web. To convert Opcodes to vector space and identify dangerous and malicious stuff applications, we employ a deep learning approach. We demonstrate the robustness of our suggested strategy against spyware detection and garbage Code injection assaults. Finally, we will obtain the GitHub spyware model, that will help the future research efforts Opcode inspection is thwarted by a Junk attack, which is a malware anti-forensic tactic. As the term implies, Junk code will include the inclusion of harmless Opcode (operational code) sequences that executewithin thespyware or the introduction according to the directions that will not affect thespyware behaviour

Keywords : Intrusion detection, Machine learning, IoT.


Paper Submission Last Date
31 - March - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.