Research Article

An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data

Table 1

Several common types of network attacks.

AttacksQuantity

DoS and DDoSDoS attack is designed to overload system resources to the point where they can no longer respond to legitimate service requests. And DDoS is initiated by controlling a large number of hosts infected with malware
MITMAs an “indirect” intrusion attack, a man-in-the-middle (MITM) type of network attack allows an attacker to eavesdrop and steal communications from two computers without directly affecting the network
DNS spoofingSpoofing through the domain name system (DNS) is also a form of man-in-the-middle attack, where a hacker can change the DNS records returned to the querier to a response record of the attacker’s choosing
URL resolutionThrough URL interpretation, an attacker can change and forge certain URL addresses and access to personal or company private data
Zero-day attacksZero-day attacks are computer vulnerabilities that have not been discovered by security vendors but may be in the hands of hacker groups, and once they are discovered, 0 day vulnerability attacks can spread rapidly