Research Article

Securing the IoT System of Smart City against Cyber Threats Using Deep Learning

Table 1

Cyber-attacks description.

Cyber-attacksDescription

Port scanning [27]Before initiating the actual attack, it is applied to get information about a target machine such as available services and opening ports. For this purpose, the attackers use different scanning tools such as nessus [28]
Distributed denial of service (DDoS)It is a flooding attack where an intruder usually initiates a series of malicious attempts to exhaust the system resources
RansomwareIt is a complex type of malware that disallows legitimate users’ access to services or systems through encryption. The attacker tries to sell the decryption key to the access system
Backdoor [29]It is a passive attack type that allows an attacker to get unauthorized access to the infected IoT devices through backdoor malware
Injection attack [30]This attack is usually used to inject malicious data or execute malicious codes into IoT-based systems
Cross-site scripting (XSS) [30]This attack is usually used to inject malicious commands on a web server
Password cracking attack [24]The attacker uses password cracking techniques such as dictionary attacks or brute force to predict IoT machines’ passwords