Botnet Detection in IoT Networks: A Review of Deep Learning Techniques and Performance Metrics

Authors

  • Jahanvi Dubey
  • Deepshikha Patel

Keywords:

Networks, Botnet Detection, Deep Learning, CNN, RNN, LSTM, Hybrid Models, Intrusion Detection, Network Security, Time-Series Analysis.

Abstract

The exponential growth of Internet of Things (IoT) networks has transformed industries and daily life but has also exposed significant security vulnerabilities, making IoT devices highly susceptible to botnet attacks. This study examines the application of deep learning techniques to effectively detect and mitigate botnet threats in IoT environments. Models such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Long Short-Term Memory networks (LSTMs), and hybrid architectures have proven effective in analyzing complex network traffic and identifying malicious behaviors. The study evaluates the performance of these models, including hierarchical frameworks and hybrid approaches, across benchmark datasets like BoT-IoT and N-BaIoT. It also explores enhancements like feature extraction, quantization techniques, and adaptive learning strategies. While these methods show high accuracy and efficiency, challenges such as resource limitations, evolving attack strategies, and the lack of standardized datasets persist. This study emphasizes the need for innovative and scalable solutions, highlighting the potential of advanced techniques to strengthen IoT security and ensure robust botnet detection systems for evolving cyber threats.

Downloads

Download data is not yet available.

Author Biographies

  • Jahanvi Dubey

    M.Tech Scholar

    Department of Computer Science & Technology

    Oriental Institute of Science and Technology

    Bhopal, Madhya Pradesh, India

  • Deepshikha Patel

    Head of Department

    Department of Computer Science & Technology

    Oriental Institute of Science and Technology

    Bhopal, Madhya Pradesh, India

References

Alsharif, M. H., Kelechi, A. H., Jahid, A., Kannadasan, R., Singla, M. K., Gupta, J., and Geem, Z. W. (2024). A comprehensive survey of energy-efficient computing enables sustainable massive IoT networks. Alexandria Engineering Journal, 91, 12-29. https://doi.org/10.1016/j.aej.2024.01.067

Khazane, H., Ridouani, M., Salahdine, F., & Kaabouch, N. (2024). A holistic review of machine learning adversarial attacks in IoT networks. Future Internet, 16(1), 32. https://doi.org/10.3390/fi16010032

Aldhaheri, A., Alwahedi, F., Ferrag, M. A., & Battah, A. (2024). Deep learning for cyber threat detection in IoT networks: A review. Internet of Things and cyber-physical systems, 4, 110-128. https://doi.org/10.1016/j.iotcps.2023.09.003

Atmaja, Ardian & Setia, Luthfiyah & Fajar, Muhammad & Ismar, MH. (2022). Low Cost IoT Based Home Smart Locker to Receive Online Shopping Packages. Andalasian International Journal of Applied Science, Engineering and Technology. 2. 126-132. 10.25077/aijaset. v2i03.57.

Alomari, A., & Kumar, S. A. (2024). Securing IoT Systems in a Post-Quantum Environment: Vulnerabilities, Attacks, and Possible Solutions. Internet of Things, 101132. https://doi.org/10.1016/j.iot.2024.101132

Bakhshi, T., Ghita, B., & Kuzminykh, I. (2024). A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors, 24(2), 708. https://doi.org/10.3390/s24020708

Downloads

Published

03/28/2025

Issue

Section

Articles

How to Cite

Botnet Detection in IoT Networks: A Review of Deep Learning Techniques and Performance Metrics. (2025). SMART MOVES JOURNAL IJOSCIENCE, 11(3), 22-30. http://ijoscience.com/index.php/ojsscience/article/view/547

Similar Articles

1-10 of 348

You may also start an advanced similarity search for this article.