Security and Communication Networks

Identification of Attack Traffic Using Machine Learning in Smart IoT Networks


Publishing date
01 Aug 2021
Status
Published
Submission deadline
02 Apr 2021

Lead Editor
Guest Editors

1Guangzhou University, Guangzhou, China

2University of Swabi, Swabi, Pakistan

3Harbin Institute of Technology, Harbin, China


Identification of Attack Traffic Using Machine Learning in Smart IoT Networks

Description

Identifying attack traffic is very important for the security of Internet of Things (IoT) in smart cities by using Machine Learning (ML) algorithms. Recently, the IoT security research community has endeavoured to build anomaly, intrusion, and cyber-attack traffic identification models using Machine Learning algorithms for IoT security analysis.

However, some critical and significant problems have not yet been studied in depth. One such problem is how to select an effective ML algorithm when there are numbers of ML algorithms for a cyber-attack detection system for IoT security. Will early stage traffic management give effective results if applied to IoT traffic management by using ML algorithms, or will this affect the performance of the ML model if several features are selected? Methods must avoid the risk of inaccuracy, inefficiency, and privacy leakage of machine learning techniques in IoT.

The main objective of this Special Issue is to publish articles based on feature selection, algorithms, protocols, frameworks, and machine learning techniques in IoT that extend the current state of the art with innovative ideas and solutions in the broad area of security attacks traffic detection and network traffic management. Theoretical as well as experimental studies for typical and newly emerging convergence technologies and cases enabled by recent advances are encouraged. High-quality review papers are also welcome.

Potential topics include but are not limited to the following:

  • Security attack traffic identification using machine learning techniques
  • IoT network traffic management
  • New concepts and architectures for IoT traffic management
  • Malicious traffic identification in IoT network
  • Quality of Experience (QoE)/Quality of Service (QoS) for IoT network management
  • Security strategy in IoT systems using machine learning techniques
  • ML algorithms for IoT applications
  • Security and privacy techniques in IoT environment
  • Smart IoT devices selection in IoT network using machine learning techniques
  • Security-related classification and analytics
  • Blockchain-based security management for IoT applications
  • New concepts and architecture for IoT traffic management
  • Malicious behaviour identification for IoT network using machine learning techniques
  • Storage issues in IoT networks

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9804596
  • - Editorial

Identification of Attack Traffic Using Machine Learning in Smart IoT Networks

Muhammad Shafiq | Shah Nazir | Xiangzhan Yu
  • Special Issue
  • - Volume 2021
  • - Article ID 5566347
  • - Research Article

Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD

Jiu Lou | Zhongliang Xu | ... | Hongwei Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 9965157
  • - Research Article

DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems

Shichang Xuan | Ming Jin | ... | Dapeng Man
  • Special Issue
  • - Volume 2021
  • - Article ID 5561816
  • - Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Priyanka Dixit | Rashi Kohli | ... | Rutvij H. Jhaveri
  • Special Issue
  • - Volume 2021
  • - Article ID 9921826
  • - Research Article

A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions

Muhammad Altaf Khan | Moustafa M. Nasralla | ... | Nikumani Choudhury
  • Special Issue
  • - Volume 2021
  • - Article ID 5523806
  • - Research Article

Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors

Khuda Bux Jalbani | Muhammad Yousaf | ... | Zojan Memon
  • Special Issue
  • - Volume 2021
  • - Article ID 9954951
  • - Research Article

AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment

Xiang Yu | Chun Shan | ... | Haifeng Song
  • Special Issue
  • - Volume 2021
  • - Article ID 5521713
  • - Research Article

TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network

Mohammad Sirajuddin | Ch. Rupa | ... | Cresantus Biamba
  • Special Issue
  • - Volume 2021
  • - Article ID 9949204
  • - Research Article

Compressed Wavelet Tensor Attention Capsule Network

Xiushan Liu | Chun Shan | ... | Peng Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 5587511
  • - Research Article

Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem

Haseeb Tariq | Muhammad Kashif Hanif | ... | Rozita Jamili Oskouei
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.