Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things
Table 3
Dataset traffic distributions.
Traffic label
Description/characteristic
Training record
Testing record
Worm
Intruder replicates itself to spread to other computers
130
44
Shellcodes
A small part of the code utilized as the payload in the exploitation of software vulnerability
1133
378
Backdoors
A method in which a system security is bypassed stealthily to access a computer or its data.
1746
583
Analyses
It includes various attacks of port scan, spam, and html file penetrations
2000
677
Reconnaissance
Contains all strikes that can simulate attacks that collect data
10491
3496
DoS
A malicious effort to make a network or server resource unavailable to users, usually by temporarily suspending or interrupting the host’s services connected to the Internet
12264
4089
Fuzzer
Attempting to cause a network or program suspended by feeding it the randomly generated data
18184
6062
Exploit
The attacker knows of a security issue within an OS or a part of software and leverages that knowledge by exploiting the vulnerability
33393
11132
Generics
A method works against each block cipher, without considering about the block-cipher structure