Research Article

Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things

Table 3

Dataset traffic distributions.

Traffic labelDescription/characteristicTraining recordTesting record

WormIntruder replicates itself to spread to other computers13044
ShellcodesA small part of the code utilized as the payload in the exploitation of software vulnerability1133378
BackdoorsA method in which a system security is bypassed stealthily to access a computer or its data.1746583
AnalysesIt includes various attacks of port scan, spam, and html file penetrations2000677
ReconnaissanceContains all strikes that can simulate attacks that collect data104913496
DoSA malicious effort to make a network or server resource unavailable to users, usually by temporarily suspending or interrupting the host’s services connected to the Internet122644089
FuzzerAttempting to cause a network or program suspended by feeding it the randomly generated data181846062
ExploitThe attacker knows of a security issue within an OS or a part of software and leverages that knowledge by exploiting the vulnerability3339311132
GenericsA method works against each block cipher, without considering about the block-cipher structure4000018871
NormalNatural transaction data5600037000
Total17534182322