Botnet Detection in IoT Networks: A Review of Deep Learning Techniques and Performance Metrics
Keywords:
Networks, Botnet Detection, Deep Learning, CNN, RNN, LSTM, Hybrid Models, Intrusion Detection, Network Security, Time-Series Analysis.Abstract
The exponential growth of Internet of Things (IoT) networks has transformed industries and daily life but has also exposed significant security vulnerabilities, making IoT devices highly susceptible to botnet attacks. This study examines the application of deep learning techniques to effectively detect and mitigate botnet threats in IoT environments. Models such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Long Short-Term Memory networks (LSTMs), and hybrid architectures have proven effective in analyzing complex network traffic and identifying malicious behaviors. The study evaluates the performance of these models, including hierarchical frameworks and hybrid approaches, across benchmark datasets like BoT-IoT and N-BaIoT. It also explores enhancements like feature extraction, quantization techniques, and adaptive learning strategies. While these methods show high accuracy and efficiency, challenges such as resource limitations, evolving attack strategies, and the lack of standardized datasets persist. This study emphasizes the need for innovative and scalable solutions, highlighting the potential of advanced techniques to strengthen IoT security and ensure robust botnet detection systems for evolving cyber threats.
Downloads
References
Alsharif, M. H., Kelechi, A. H., Jahid, A., Kannadasan, R., Singla, M. K., Gupta, J., and Geem, Z. W. (2024). A comprehensive survey of energy-efficient computing enables sustainable massive IoT networks. Alexandria Engineering Journal, 91, 12-29. https://doi.org/10.1016/j.aej.2024.01.067
Khazane, H., Ridouani, M., Salahdine, F., & Kaabouch, N. (2024). A holistic review of machine learning adversarial attacks in IoT networks. Future Internet, 16(1), 32. https://doi.org/10.3390/fi16010032
Aldhaheri, A., Alwahedi, F., Ferrag, M. A., & Battah, A. (2024). Deep learning for cyber threat detection in IoT networks: A review. Internet of Things and cyber-physical systems, 4, 110-128. https://doi.org/10.1016/j.iotcps.2023.09.003
Atmaja, Ardian & Setia, Luthfiyah & Fajar, Muhammad & Ismar, MH. (2022). Low Cost IoT Based Home Smart Locker to Receive Online Shopping Packages. Andalasian International Journal of Applied Science, Engineering and Technology. 2. 126-132. 10.25077/aijaset. v2i03.57.
Alomari, A., & Kumar, S. A. (2024). Securing IoT Systems in a Post-Quantum Environment: Vulnerabilities, Attacks, and Possible Solutions. Internet of Things, 101132. https://doi.org/10.1016/j.iot.2024.101132
Bakhshi, T., Ghita, B., & Kuzminykh, I. (2024). A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors, 24(2), 708. https://doi.org/10.3390/s24020708
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jahanvi Dubey , Deepshikha Patel

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.