<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">73577</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.073577</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things</article-title>
<alt-title alt-title-type="left-running-head">Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things</alt-title>
<alt-title alt-title-type="right-running-head">Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Abdelhaq</surname><given-names>Maha</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Al-Shamayleh</surname><given-names>Ahmad Sami</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Akhunzada</surname><given-names>Adnan</given-names></name><xref ref-type="aff" rid="aff-3">3</xref><xref rid="cor1" ref-type="corresp">&#x002A;</xref><email>adnan.adnan@udst.edu.qa</email></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Ivkovi&#x0107;</surname><given-names>Nikola</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Hasan</surname><given-names>Toobah</given-names></name><xref ref-type="aff" rid="aff-5">5</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University</institution>, <addr-line>P.O. Box 84428, Riyadh, 11671</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Data Science and Artificial Intelligence, Faculty of Information Technology, Al-Ahliyya Amman University</institution>, <addr-line>Amman, 19328</addr-line>, <country>Jordan</country></aff>
<aff id="aff-3"><label>3</label><institution>College of Computing and Information Technology, Departement of Data &#x0026; Cybersecurity, University of Doha for Science &#x0026; Technology</institution>, <addr-line>Doha, 2444</addr-line>, <country>Qatar</country></aff>
<aff id="aff-4"><label>4</label><institution>Faculty of Organization and Informatics, University of Zagreb, Pavlinska 2</institution>, <addr-line>Vara&#x017E;din, 42000</addr-line>, <country>Croatia</country></aff>
<aff id="aff-5"><label>5</label><institution>COMSAT University Islamabad (CUI)</institution>, <addr-line>Islamabad, 45550</addr-line>, <country>Pakistan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Adnan Akhunzada. Email: <email>adnan.adnan@udst.edu.qa</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2026</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>10</day><month>2</month><year>2026</year>
</pub-date>
<volume>87</volume>
<issue>1</issue>
<elocation-id>53</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>09</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>24</day>
<month>11</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2026 The Authors.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_73577.pdf"></self-uri>
<abstract>
<p>The rapid expansion of the Internet of Things (IoT) and Edge Artificial Intelligence (AI) has redefined automation and connectivity across modern networks. However, the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistent malware attacks. These adaptive and stealthy threats can evade conventional detection, establish remote control, propagate across devices, exfiltrate sensitive data, and compromise network integrity. This study presents a Software-Defined Internet of Things (SD-IoT) control-plane-based, AI-driven framework that integrates Gated Recurrent Units (GRU) and Long Short-Term Memory (LSTM) networks for efficient detection of evolving multi-vector, malware-driven botnet attacks. The proposed CUDA-enabled hybrid deep learning (DL) framework performs centralized real-time detection without adding computational overhead to IoT nodes. A feature selection strategy combining variable clustering, attribute evaluation, one-R attribute evaluation, correlation analysis, and principal component analysis (PCA) enhances detection accuracy and reduces complexity. The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation. Experimental results achieve 99.96% detection accuracy, a false positive rate (FPR) of 0.0035%, and a detection latency of 0.18 ms, confirming its high efficiency and scalability. The findings demonstrate the framework&#x2019;s potential as a robust and intelligent security solution for next-generation IoT ecosystems.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>AI-driven malware analysis</kwd>
<kwd>advanced persistent malware (APM)</kwd>
<kwd>AI-powered malware detection</kwd>
<kwd>deep learning (DL)</kwd>
<kwd>malware-driven botnets</kwd>
<kwd>software-defined internet of things (SD-IoT)</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The rapid advancement of technology and the proliferation of smart devices have driven exponential growth in IoT connectivity, with nearly 30.9 billion devices projected by 2025 [<xref ref-type="bibr" rid="ref-1">1</xref>]. While these developments enable intelligent communication, they also introduce significant cybersecurity challenges [<xref ref-type="bibr" rid="ref-2">2</xref>]. The heterogeneous, dynamic, and resource-constrained nature of IoT devices generates massive data and exposes networks to vulnerabilities, threats, and sophisticated attacks, including phishing, Man-in-the-Middle (MitM), side-channel exploits, application-layer intrusions, and large-scale malware-driven botnets. Among these, malware-driven botnets are particularly severe, enabling DDoS, ransomware, credential theft, spam campaigns, and propagation of additional malware [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-5">5</xref>]. Early and efficient detection of such threats is critical for mitigation and prevention [<xref ref-type="bibr" rid="ref-6">6</xref>&#x2013;<xref ref-type="bibr" rid="ref-8">8</xref>]. Software-defined IoT (SD-IoT) provides a promising approach by using centralized and programmable SDN control to manage heterogeneous networks, including IoT, Fog of Things (FoT), and Industrial IoT (IIoT) without overburdening devices [<xref ref-type="bibr" rid="ref-9">9</xref>]. By separating the control and data planes, SDN enables dynamic, adaptive, and automated detection mechanisms, supporting secure network orchestration, flexible device management, and scalable operation across large IoT ecosystems. This study is guided by four key research questions: (1) how the hybrid GRU&#x2013;LSTM framework enhances malware botnet detection accuracy in IoT environments; (2) how effectively it addresses multiclass detection challenges such as class imbalance and dynamic traffic patterns; (3) how its performance compares with state-of-the-art intrusion detection models in terms of accuracy and generalization across datasets; and (4) whether it can maintain lightweight computational efficiency for real-time deployment in resource-constrained IoT networks. The main contributions of this paper are as follows:
<list list-type="bullet">
<list-item>
<p>This study presents a scalable AI-driven Software-Defined Internet of Things (SD-IoT) framework designed to safeguard critical IoT infrastructures against sophisticated malware botnet attacks. The framework integrates Gated Recurrent Units (GRU) and Long Short-Term Memory (LSTM) framework for enhanced threat detection, while the centralized control plane enforces security policies efficiently without adding computational overhead to resource-constrained IoT devices.</p></list-item>
<list-item>
<p>The proposed framework undergoes extensive evaluation using the well-established N-BaIoT dataset, ensuring a rigorous assessment against multivector botnet attacks through standard performance metrics.</p></list-item>
<list-item>
<p>By integrating feature selection techniques, the framework effectively identifies and prioritizes critical features, reducing computational complexity while maintaining high detection accuracy.</p></list-item>
<list-item>
<p>The framework&#x2019;s efficacy and robustness is validated through extended performance metrics and a 10-fold cross-validation approach, ensuring reliability in diverse deployment scenarios.</p></list-item>
<list-item>
<p>Experimental results and analysis demonstrate superior performance in both detection accuracy and real-time processing, establishing a new benchmark for SDN-driven IoT security solutions.</p></list-item>
</list></p>
<p>The remainder of this paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> reviews the background and related work; <xref ref-type="sec" rid="s3">Sections 3</xref> and <xref ref-type="sec" rid="s4">4</xref> details the proposed methodology, including architecture, preprocessing, dataset, and evaluation metrics; <xref ref-type="sec" rid="s5">Section 5</xref> presents the experimental setup, results, and discussion; and <xref ref-type="sec" rid="s6">Section 6</xref> concludes the study with future directions.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Background and Related Work</title>
<p>This section briefly describes the background architecture of SD-IoV and given botnet attacks. Besides, the related work about botnet detection in IoT is discussed.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Background</title>
<p>Software-Defined Networking (SDN) enables centralized intelligence and programmability across the application, control, and data planes, facilitating efficient management of IoT and IIoT ecosystems [<xref ref-type="bibr" rid="ref-9">9</xref>]. However, the rise of sophisticated IoT botnets such as Mirai and Gafgyt, capable of large-scale DDoS and remote exploitation, has rendered traditional detection techniques inadequate, demanding advanced AI-driven behavioral and network-based defenses [<xref ref-type="bibr" rid="ref-10">10</xref>].</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Related Work</title>
<p>DL-driven architectures remain in their early stages for securing IoT networks [<xref ref-type="bibr" rid="ref-11">11</xref>]. In [<xref ref-type="bibr" rid="ref-12">12</xref>], an LSTM-based botnet detection model using CVUT traffic data achieved 99.9% accuracy. Similarly, reference [<xref ref-type="bibr" rid="ref-13">13</xref>] proposed a Bidirectional LSTM for IoT-botnet detection, attaining 96% accuracy on a Mirai-based dataset. Reference [<xref ref-type="bibr" rid="ref-14">14</xref>] combined CNN and RNN on CTU-13 and ISOT datasets, achieving 99.3%detection, while reference [<xref ref-type="bibr" rid="ref-15">15</xref>] applied LSTM to analyze content and metadata, yielding 98% accuracy. In [<xref ref-type="bibr" rid="ref-16">16</xref>], multiple DL models (LSTM, RNN, CNN) identified malicious domains with a 90% detection rate. Reference [<xref ref-type="bibr" rid="ref-17">17</xref>] emphasized deep learning&#x2019;s strength in multi-level abstraction and anomaly detection. Further, reference [<xref ref-type="bibr" rid="ref-18">18</xref>] utilized LSTM and SVM for detecting various attacks (DoS, DDoS, Port Scanning, etc.) in SDN-IoT using SDN-IoT and SDN-NF-TJ datasets, achieving 97% accuracy. Likewise, reference [<xref ref-type="bibr" rid="ref-19">19</xref>] presented a DNN-LSTM hybrid for fog-based SDN environments using N_BaIoT 2018, achieving 99.98% accuracy. Reference [<xref ref-type="bibr" rid="ref-20">20</xref>] proposed a GRU-LSTM hybrid for distributed attack detection using NSL-KDD, achieving 87.9% accuracy. In [<xref ref-type="bibr" rid="ref-21">21</xref>], an SDN-based IDS using LSTM achieved 91.4% on CSE-CIC-IDS2018, while reference [<xref ref-type="bibr" rid="ref-22">22</xref>] reached 99.9% with LSTM on N_BaIoT 2018 for binary botnet detection. Our proposed SDN-empowered system aims to enhance IoT security in scalability, performance, and control-plane protection. Unlike existing works, it addresses the lack of next-generation IoT datasets, limited training instances, and absence of comprehensive evaluations using standard and extended performance metrics. <xref ref-type="table" rid="table-1">Table 1</xref> summarizes the comparison of related work and key characteristics.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Comparison of existing literature with characteristics</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center" width="23mm"/>
<col align="center" width="26mm"/>
<col align="center" width="32mm"/>
<col align="center" width="32mm"/>
<col align="center" width="32mm"/> </colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Attack</th>
<th>Model</th>
<th>Dataset/Method</th>
<th>Strength</th>
<th>Limitation</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic><bold>Our</bold></italic></td>
<td>Mirai and Gafgyt Botnet</td>
<td>LSTM-GRU</td>
<td>N_BaIoT/Hybrid DL model</td>
<td>Implemented hybrid model (GRU-LSTM) for the detection of botnet attack in IoT</td>
<td>Detection time could be improved.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>Botnet</td>
<td>LSTM</td>
<td>Self-generated dataset (CVUT)</td>
<td>Method for detecting the botnet attack</td>
<td>Did not consider hybrid algorithms.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-14">14</xref>]</td>
<td>UDP, ACK, DNS</td>
<td>BiLSTM</td>
<td>Botnet and self-generated benign records/DL algorithm with embedding word</td>
<td>Packet-level detection in IoTs and network</td>
<td>Bidirectional approach adds overhead and increases processing time.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-15">15</xref>]</td>
<td>DDoS, SPAM, P2P, IRC</td>
<td>CNN-RNN</td>
<td>CTU-13, ISOT/Botnet detection by modelling network traffic</td>
<td>Inspects statistical-based network flow features</td>
<td>Utilisation of updated dataset is meaningful.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-16">16</xref>]</td>
<td>TCP, HTTP, UDP</td>
<td>LSTM</td>
<td>Cresci et al./Use the content and metadata by considering LSTM and synthetic minority oversampling</td>
<td>LSTM could detect Botnet behaviours that were significantly different from Normal.</td>
<td>Old-dated dataset has been considered for evaluation.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-17">17</xref>]</td>
<td>Botnet</td>
<td>CNN-LSTM, LSTM</td>
<td>Dataset of Alexa and 17-JGA/Analyze and find domain names using DL</td>
<td>Detect malware by specifying domains</td>
<td>Lack in presenting inner mechanics of DL model.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>N/A</td>
<td>CNN, RNN</td>
<td>N/A/Deep Learning overview</td>
<td>Explain the significance of DL in numerous frameworks</td>
<td>No implementation.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>Botnet</td>
<td>LSTM, SVM</td>
<td>SDN-IoT, SDN-NF-TJ/Network attack detection using SDN in IoT</td>
<td>Considered the power of SDN</td>
<td>Lack in presenting the 10-fold results.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td>Botnet</td>
<td>DNN-LSTM</td>
<td>N_BaIoT/Botnet detection in fog using SDN</td>
<td>Identify botnet attack in fog using SDN</td>
<td>Need to consider more data for experimentation.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>Distributed attack</td>
<td>GRU-LSTM</td>
<td>NSL-KDD/Identify distributed attack in IoT</td>
<td>Use DL-based hybrid framework for attack detection</td>
<td>The detection rate is low to detect the advanced attacks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>]</td>
<td>Intrusion detection</td>
<td>LSTM</td>
<td>CSE-CIC-IDS2018/IDS system for detecting attack in IoT using SDN</td>
<td>SDN framework is efficient for detecting intrusion</td>
<td>Detection accuracy is 91.4% which is not impressive.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-23">23</xref>]</td>
<td>Botnet</td>
<td>LSTM</td>
<td>N_BaIoT/Botnet attack detection in IoT using SDN</td>
<td>SDN framework is implemented for botnet detection</td>
<td>The proposed work is for binary attack detection only.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Preliminaries</title>
<p>The algorithms and dataset used in this paper are detailed in this section.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Algorithms</title>
<p>The basic architectural description of proposed algorithms and dataset are discussed below.</p>
<sec id="s3_1_1">
<label>3.1.1</label>
<title>Gated Recurrent Unit (GRU)</title>
<p>Gated Recurrent Unit (GRU), a newer variant of the recurrent neural network family [<xref ref-type="bibr" rid="ref-23">23</xref>], addresses the vanishing gradient problem by using two gates (update and reset) to control information flow and memory retention [<xref ref-type="bibr" rid="ref-24">24</xref>]. With fewer tensor operations and no separate cell state, GRU offers faster training while maintaining effective long-term dependency modeling [<xref ref-type="bibr" rid="ref-25">25</xref>].</p>
</sec>
<sec id="s3_1_2">
<label>3.1.2</label>
<title>Long Short-Term Memory (LSTM)</title>
<p>Long short-term Memory (LSTM) bridges the temporal gap to solve the vanishing gradient problem and has a similar control flow as a recurrent neural network for long term memory [<xref ref-type="bibr" rid="ref-26">26</xref>]. The forget gate is used by the recurrent neural network (RNN) to retain information across longer sequences. Back-propagation amplifies error signals, resulting in poor system performance and execution.</p>
</sec>
<sec id="s3_1_3">
<label>3.1.3</label>
<title>Convolutional Neural Network (CNN)</title>
<p>Convolutional Neural Network (CNN) is a type of artificial neural network widely used for computer vision, classification, and object recognition. Its multilayered architecture, including convolutional, pooling, fully connected, flattening, and padding layers, enables real-time extraction of significant features from input data, with mathematical formulations detailed in [<xref ref-type="bibr" rid="ref-27">27</xref>].</p>
</sec>
<sec id="s3_1_4">
<label>3.1.4</label>
<title>Deep Neural Network (DNN)</title>
<p>Deep Neural Network (DNN) is a fully connected neural network designed to simulate human brain activity for pattern recognition and learning. It consists of input, hidden, and output layers, where neurons perform computations on incoming data and weights before passing information forward, with mathematical formulations detailed in [<xref ref-type="bibr" rid="ref-28">28</xref>].</p>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Methodology</title>
<p>This section elaborates the methodology of the proposed framework, employed DL algorithms, dataset utilized, and pre-processing of data with feature selection techniques. A simplified overview of the control plane-enabled malware botnet detection framework is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref> [<xref ref-type="bibr" rid="ref-22">22</xref>]. The proposed hybrid DL-driven framework is highly scalable, and efficient. Besides, the software defined orchestration does not put extra load on the IoT infrastructure; on the contrary it enables engineers to maintain and perform security operations in a more reliable and automated manner. To reduce extra overhead, we applied feature selection mechanisms to get the best features that optimize the accuracy and time complexity.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>The architecture of proposed hybrid framework</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-1.tif"/>
</fig>
<sec id="s4_1">
<label>4.1</label>
<title>Dataset</title>
<p>We utilized the N_BaIoT dataset, developed by the University of Negev, Israel, to address the limitations of outdated botnet datasets [<xref ref-type="bibr" rid="ref-29">29</xref>]. This dataset captures evolving IoT attack patterns, including Mirai and Gafgyt, across nine device types such as security cameras, webcams, doorbells, thermostats, and baby monitors. <xref ref-type="table" rid="table-2">Table 2</xref> summarizes the dataset, which comprises 7,062,611 records, of which 4,590,136 were used for experimentation, including 292,044 benign and 2,405,593 attack instances. The dataset contains 116 attributes, with 115 features and one label.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Dataset description</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Sr.</th>
<th>Name</th>
<th>Benign</th>
<th>Mirai</th>
<th>Gafgyt</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Thermostat</td>
<td>13,113</td>
<td>512,134</td>
<td>310,631</td>
</tr>
<tr>
<td>2</td>
<td>PT 737E Security Camera</td>
<td>62,154</td>
<td>436,011</td>
<td>330,095</td>
</tr>
<tr>
<td>3</td>
<td>PT 838E Security Camera</td>
<td>98,514</td>
<td>429,338</td>
<td>309,040</td>
</tr>
<tr>
<td>4</td>
<td>SNH 1011 Web Cam</td>
<td>52,150</td>
<td>&#x2013;</td>
<td>323,072</td>
</tr>
<tr>
<td>5</td>
<td>XCS7 1002 WHT Security Camera</td>
<td>46,585</td>
<td>513,249</td>
<td>303,223</td>
</tr>
<tr>
<td>6</td>
<td>XCS7 1003 WHT Security Camera</td>
<td>19,528</td>
<td>514,861</td>
<td>316,438</td>
</tr>
<tr>
<td></td>
<td><bold>Total Records</bold></td>
<td><bold>292,044</bold></td>
<td><bold>2,405,593</bold></td>
<td><bold>1,892,499</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Although the experiments were conducted solely on the N_BaIoT dataset, its rich diversity of benign and malicious traffic traces collected from multiple IoT devices under real-world conditions supports strong model generalization. The dataset encompasses dynamic traffic behaviors, device heterogeneity, and a wide range of attack signatures (e.g., Mirai and Gafgyt), making it representative of modern IoT network environments. Consequently, the proposed framework can be readily adapted to other IoT and IIoT datasets with minimal retraining, ensuring scalability and applicability to real-world deployments.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Pre-Processing</title>
<p>The dataset utilized in this paper contains records of various IoT device. This dataset needs to pre-processed for removing anomalies and the extraction of useful features from data. The preprocessing of the N_BaIoT2018 dataset has been completed. Records having missing, nan, or infinite values were first removed from the dataset. To enhance the quality of the dataset, the normalization is likewise accomplished, which incorporates scaling all values from 0&#x2013;1 range by using the MinMaxScalar function. The preprocessing of the dataset has been done by importing all CSV&#x2019;s files. After that, the 6 distinct CSV&#x2019;s files merged together and labels are encoded against each sample. At last, the merged CSV file is saved.</p>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>Handling Categorical Data</title>
<p>In N_BaIoT dataset, target classes are strings (i.e., Benign, Mirai, Gafgyt), therefor; One-hot-Encoding is used to change categorical data to integer data to be used subsequently for training of algorithm properly.</p>
</sec>
<sec id="s4_2_2">
<label>4.2.2</label>
<title>Feature Scaling</title>
<p>The dataset comprised of various features having the immense variation between the minimum and maximum integer values. For the stable convergence of weights and to avoid gradient ascend and descend, we have normalized all the dataset features utilizing MinMaxScaler to map values in the range of 0 and 1.</p>
</sec>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Feature Selection</title>
<p>Feature selection is applied prior to classification to enhance malware detection accuracy while reducing the computational complexity of deep learning model training. Recent studies highlight the benefits of combining multiple feature filtration methods, as individually weak features can collectively improve classifier performance. In this work, features were extracted using five techniques, Variable Clustering Attribute, One-R Attribute Evaluation, Attribute Evaluation, Correlation, and Principal Component Analysis (PCA), as summarized in <xref ref-type="table" rid="table-3">Table 3</xref>. The less common feature selection techniques include the Variable Clustering Attribute method, which groups correlated features to minimize redundancy, and the One-R Evaluation, which employs simple rule-based accuracy to enhance interpretability and computational efficiency. Experiment is performed on Weka [<xref ref-type="bibr" rid="ref-30">30</xref>] for feature filtration. For experimentation, total number of samples are 4,590,136 out of which 292,044 benign and 4,298,092 botnet signatures. From botnet signatures, 1,892,499 Gafgyt, and 2,405,593 are Mirai attack. To achieve efficient and accurate results, we have performed feature filtration techniques to get significant features using 5 distinct techniques, and finally we applied majority voting mechanism to get 74 best features. Besides, 75th feature is a label representing a total of 75 features.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>List of best feature with their corresponding feature selection mechanism</title>
</caption>
<table>
<colgroup>
<col align="center" width="2cm"/>
<col align="center" width="130mm"/> </colgroup>
<thead>
<tr>
<th>Techniques</th>
<th>Features</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5"><bold>Attribute evaluation</bold></td>
<td>115,39,38,40,29,41,37,36,35,34,31,32,33,42,43,44,51,53,54,55,52,50,45,49,46,47,48,30,28</td>
</tr>
<tr>

<td>57,10,11,27,12,8,7,81,79,71,72,6,5,2,3,4,13,76,77,78,14,15,22,24,25,26,23,21,16,20,17,112,</td>
</tr>
<tr>

<td>56,1,58,114,97,96,98,87,99,95,94,93,92,89,90,91,84,75,73,80,100,101,102,109,62,63,61,82,</td>
</tr>
<tr>

<td>113,110,108,103,107,104,105,83,88,86,59,68,67,69,85,70,74,66,65,64,63,60,106,112,18,19,</td>
</tr>
<tr>

<td>111,9</td>
</tr>
<tr>
<td rowspan="4"><bold>Variation clustering attribute</bold></td>
<td>44,57,51,64,74,58,65,77,107,80,3,18,6,21,2,67,70,109,9,24,73,29,76,12,2,79,45,72,4,52,38</td>
</tr>
<tr>

<td>69,31,66,85,78,90,47,92,93,43,49,85,59,95,30,88,81,7,1,22,19,16,10,25,13,28,84,91,71,20</td>
</tr>
<tr>

<td>98,34,40,41,105,48,37,68,55,82,89,62,96,32,103,39,110,46,94,33,36,83,53,60,17,75,5,108,</td>
</tr>
<tr>

<td>23,8,11,50,26,14,102,42,100,113,99,63,106,101,111,104,97,87,56,114,112,61,54,86,1,35</td>
</tr>
<tr>
<td rowspan="4"><bold>One R-Attribute</bold></td>
<td>30,15,76,27,12,14,29,73,79,70,67,11,26,23,8,25,10,28,13,5,20,17,2,22,7,24,9,48,40,43,101,</td>
</tr>
<tr>

<td>41,60,34,53,75,86,94,87,93,83,52,46,98,91,21,84,6,105,112,63,77,78,59,61,39,56,19,80,18,</td>
</tr>
<tr>

<td>3,32,72,54,74,45,110,96,103,89,82,16,1,49,64,90,37,44,92,85,109,102,57,65,50,47,113,111,</td>
</tr>
<tr>

<td>106,95,58,38,69,104,42,66,31,99,71,35,97,114,107,51,36,115,33,68,88,81,108,100,55,62,4</td>
</tr>
<tr>
<td rowspan="4"><bold>Correlation</bold></td>
<td>13,28,4,19,1,16,30,15,7,22,10,25,29,14,26,11,9,24,61,79,27,12,73,67,70,23,68,21,20,5,111,</td>
</tr>
<tr>

<td>54,17,3,18,62,71,98,51,52,33,112,104,55,58,105,6,48,91,84,41,34,72,45,38,69,31,65,66,63,</td>
</tr>
<tr>

<td>47,53,103,60,46,96,78,110,39,89,32,82,40,56,75,44,37,87,107,114,97,90,113,83,49,106,42,</td>
</tr>
<tr>

<td>35,99,92,85,77,80,95,88,50,81,102,57,43,109,74,36,86,64,93,100,94,101,115,108,2,8</td>
</tr>
<tr>
<td><bold>PCA</bold></td>
<td>1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Proposed DL-Framework</title>
<p>We implemented three deep learning frameworks: Hybrid GRU&#x2013;LSTM, Hybrid CNN (2D&#x2013;3D), and Hybrid GRU&#x2013;DNN. Their detailed architectures, including layers, neurons, activation and loss functions, epochs, batch size, and optimizer, are summarized in <xref ref-type="table" rid="table-4">Table 4</xref>. All models were trained using categorical cross-entropy, a batch size of 128, learning rate of 0.001, and the Adam optimizer, with no dropout layers employed. Training and cross-validation are outlined in Algorithm 1, which describes the execution flow for merging two classifiers. During training, &#x201C;T&#x201D; denotes the training dataset, &#x201C;t&#x201D; the testing dataset, and &#x201C;W&#x201D; the weights for GRU (G) and LSTM (L). Nested loops iterate over epochs (&#x201C;E&#x201D;) and batches (&#x201C;B&#x201D;) to compute loss and update weights, followed by evaluation on the test set.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Description of the proposed framework</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>Layer</th>
<th>Neurons</th>
<th>B.S</th>
<th>Epoch</th>
<th>Optimizer</th>
<th>A.F</th>
<th>L.F</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5"><bold>GRU-LSTM</bold></td>
<td>GRU Layer (3)</td>
<td>(450, 400, 350)</td>
<td rowspan="5">128</td>
<td rowspan="5">5</td>
<td rowspan="5">Adam</td>
<td>ReLU</td>
<td rowspan="5">CC-E</td>
</tr>
<tr>

<td>LSTM Layer (3)</td>
<td>(450, 400, 350)</td>



<td>ReLU</td>

</tr>
<tr>

<td>Dense Layer</td>
<td>350</td>



<td>&#x2013;</td>

</tr>
<tr>

<td>Output Layer</td>
<td>3</td>



<td>Softmax</td>

</tr>
<tr>

<td>Dropout</td>
<td>&#x2013;</td>



<td>&#x2013;</td>

</tr>
<tr>
<td rowspan="5"><bold>GRU-DNN</bold></td>
<td>GRU Layer (3)</td>
<td>(450, 400, 350)</td>
<td rowspan="5">128</td>
<td rowspan="5">5</td>
<td rowspan="5">Adam</td>
<td>ReLU</td>
<td rowspan="5">CC-E</td>
</tr>
<tr>

<td>Dense Layer (3)</td>
<td>(450, 400, 350)</td>



<td>ReLU</td>

</tr>
<tr>

<td>Dense Layer</td>
<td>350</td>



<td>&#x2013;</td>

</tr>
<tr>

<td>Output Layer</td>
<td>3</td>



<td>Softmax</td>

</tr>
<tr>

<td>Dropout</td>
<td>&#x2013;</td>



<td>&#x2013;</td>

</tr>
<tr>
<td rowspan="5"><bold>CNN2D-3D</bold></td>
<td>2D Layer (3)</td>
<td>(450, 400, 350)</td>
<td rowspan="5">128</td>
<td rowspan="5">5</td>
<td rowspan="5">Adam</td>
<td>ReLU</td>
<td rowspan="5">CC-E</td>
</tr>
<tr>

<td>3D Layer (3)</td>
<td>(450, 400, 350)</td>



<td>ReLU</td>

</tr>
<tr>

<td>Dense Layer</td>
<td>350</td>



<td>&#x2013;</td>

</tr>
<tr>

<td>Output Layer</td>
<td>3</td>



<td>Softmax</td>

</tr>
<tr>

<td>Dropout</td>
<td>&#x2013;</td>



<td>&#x2013;</td>

</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table-4fn1" fn-type="other">
<p>Notes: CC-E &#x003D; Categorical Cross-Entropy; B.S &#x003D; Batch Size; A.F &#x003D; Activation Function; L.F &#x003D; Loss Function.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>The computational complexity of proposed algorithm (i.e., Hybrid GRU-LSTM) is dependent upon two different deep learning algorithms, i.e., (GRU and LSTM) due to its hybrid nature. Both of the parallel algorithms belong to the same Recurrent Neural Network (RNN) family of deep learning models, therefore they have same complexity which is represented in <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>.
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>O</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>W</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>In <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>, <italic>W</italic> is the number of the weights. RNN model is local in space and time as a result, the input size has no effect on network storage space. Thetime complexity per weight for each time step is O(1).</p>
<fig id="fig-6">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-6.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Experimental Setup, Evaluation Metrics and Results</title>
<p>This section provide details regarding the experimentation setup and evaluation of our proposed mechanism in terms of its performance. The performance evaluation metrics are also discussed in this section.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Experimental Setup</title>
<p>The construction of our proposed hybrid deep learning model includes initialization of two parallel deep learning models, i.e., GRU and LSTM following the use of a merge layer for continuation. Consequently, ending the neural network with a simple dense layer as an output layer using the &#x201C;<italic>softmax</italic>&#x201D; activation function. The details of the proposed and other contemporary models are presented in <xref ref-type="table" rid="table-4">Table 4</xref>. The software libraries used for experimentation and evaluation include TensorFlow and sklearn, respectively. An efficient, user-friendly high-level python library famously known as Keras is also utilized. The detail of the software, along with versions and hardware specifications for our experimentation, is elaborated in <xref ref-type="table" rid="table-5">Table 5</xref>.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Details of experimental setup</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Component</th>
<th>Specification</th>
<th>Library</th>
<th>Version</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>CPU</italic></td>
<td>Core i7-8750H (2.21 GHz), RAM 16 GB</td>
<td>Numpy</td>
<td>1.8.2</td>
</tr>
<tr>
<td><italic>Core/Thread</italic></td>
<td>6/12</td>
<td>TensorFlow</td>
<td>1.1.4</td>
</tr>
<tr>
<td><italic>GPU</italic></td>
<td>NVIDIA GTX 1050Ti</td>
<td>Scikit-Learn</td>
<td>0.15.2</td>
</tr>
<tr>
<td><italic>OS</italic></td>
<td>Windows 10 (64-bit)</td>
<td>Pandas</td>
<td>1.3.4</td>
</tr>
<tr>
<td><italic>Tool</italic></td>
<td>Anaconda Spyder</td>
<td>Keras</td>
<td>2.6.2</td>
</tr>
<tr>
<td><italic>Language</italic></td>
<td>Python 3.6</td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Evaluation Metrics</title>
<p>Deep learning is considered as optimum if it entails a high detection rate of accuracy to correctly identify anomalies with low false alarms. We evaluated the performance of our proposed and comparative models, Hybrid GRU-LSTM, Hybrid CNN2D-CNN3D, and Hybrid GRU-DNN, using standard metrics (accuracy, precision, recall, F1-score) and extended metrics including FNR, FPR, FDR, FOR, NPV, TNR, ROC curve, and MCC.</p>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Results</title>
<p>The deep learning framework is designed to classify three classes: benign, Mirai, and Gafgyt attacks. Experiments were conducted using the proposed hybrid GRU&#x2013;LSTM model and comparative algorithms (GRU&#x2013;DNN and CNN2D&#x2013;CNN3D). We employed 10-fold cross-validation to ensure unbiased evaluation, with results for standard metrics (precision, recall, F1-score, and accuracy) reported in <xref ref-type="table" rid="table-6">Table 6</xref>. Confusion matrices for all models are presented in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>, demonstrating that the proposed GRU&#x2013;LSTM effectively distinguishes between benign and attack classes.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>10-Fold results of GRU-LSTM, GRU-DNN, and CNN2D-CNN3D</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Metrics</th>
<th>Technique</th>
<th>1</th>
<th>2</th>
<th>3</th>
<th>4</th>
<th>5</th>
<th>6</th>
<th>7</th>
<th>8</th>
<th>9</th>
<th>10</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3"><bold>Accuracy</bold></td>
<td><italic>GRU-LSTM</italic></td>
<td>99.96</td>
<td>99.95</td>
<td>99.97</td>
<td>99.96</td>
<td>99.95</td>
<td>99.95</td>
<td>99.98</td>
<td>99.95</td>
<td>99.95</td>
<td>99.98</td>
</tr>
<tr>

<td>GRU-DNN</td>
<td>99.93</td>
<td>99.96</td>
<td>99.92</td>
<td>99.93</td>
<td>99.96</td>
<td>99.94</td>
<td>99.94</td>
<td>99.94</td>
<td>99.95</td>
<td>99.93</td>
</tr>
<tr>

<td><italic>CNN2D-CNN3D</italic></td>
<td>99.93</td>
<td>99.91</td>
<td>99.90</td>
<td>99.90</td>
<td>99.91</td>
<td>99.93</td>
<td>99.89</td>
<td>99.89</td>
<td>99.93</td>
<td>99.91</td>
</tr>
<tr>
<td rowspan="3"><bold>Precision</bold></td>
<td><italic>GRU-LSTM</italic></td>
<td>99.78</td>
<td>99.76</td>
<td>99.76</td>
<td>99.76</td>
<td>99.77</td>
<td>99.78</td>
<td>99.76</td>
<td>99.79</td>
<td>99.77</td>
<td>99.77</td>
</tr>
<tr>

<td><italic>GRU-DNN</italic></td>
<td>99.76</td>
<td>99.64</td>
<td>99.85</td>
<td>99.15</td>
<td>99.76</td>
<td>99.74</td>
<td>99.50</td>
<td>99.71</td>
<td>99.71</td>
<td>99.64</td>
</tr>
<tr>

<td>CNN2D-CNN3D</td>
<td>99.65</td>
<td>99.65</td>
<td>99.60</td>
<td>99.59</td>
<td>99.61</td>
<td>99.61</td>
<td>99.61</td>
<td>99.64</td>
<td>99.61</td>
<td>99.61</td>
</tr>
<tr>
<td rowspan="3"><bold>Recall</bold></td>
<td><italic>GRU-LSTM</italic></td>
<td>99.66</td>
<td>99.64</td>
<td>99.65</td>
<td>99.68</td>
<td>99.63</td>
<td>99.63</td>
<td>99.63</td>
<td>99.83</td>
<td>99.65</td>
<td>99.63</td>
</tr>
<tr>

<td><italic>GRU-DNN</italic></td>
<td>99.22</td>
<td>99.73</td>
<td>98.97</td>
<td>99.76</td>
<td>99.73</td>
<td>99.44</td>
<td>99.64</td>
<td>99.40</td>
<td>99.57</td>
<td>99.39</td>
</tr>
<tr>

<td><italic>CNN2D-CNN3D</italic></td>
<td>99.56</td>
<td>99.51</td>
<td>99.52</td>
<td>99.53</td>
<td>99.53</td>
<td>99.56</td>
<td>99.54</td>
<td>99.54</td>
<td>99.54</td>
<td>99.52</td>
</tr>
<tr>
<td rowspan="3"><bold>F1-score</bold></td>
<td><italic>GRU-LSTM</italic></td>
<td>99.66</td>
<td>99.64</td>
<td>99.65</td>
<td>99.68</td>
<td>99.63</td>
<td>99.63</td>
<td>99.63</td>
<td>99.83</td>
<td>99.65</td>
<td>99.63</td>
</tr>
<tr>

<td><italic>GRU-DNN</italic></td>
<td>99.22</td>
<td>99.73</td>
<td>98.97</td>
<td>99.76</td>
<td>99.73</td>
<td>99.44</td>
<td>99.64</td>
<td>99.40</td>
<td>99.57</td>
<td>99.39</td>
</tr>
<tr>

<td><italic>CNN2D-CNN3D</italic></td>
<td>99.56</td>
<td>99.51</td>
<td>99.52</td>
<td>99.53</td>
<td>99.53</td>
<td>99.56</td>
<td>99.54</td>
<td>99.54</td>
<td>99.54</td>
<td>99.52</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Confusion matrices of proposed GRU-LSTM, GRU-DNN and CNN2D-CNN3D</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-2.tif"/>
</fig>
<p>To evaluate the performance of the proposed algorithms, accuracy, precision, recall, and F1-score were computed. As shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, the hybrid GRU&#x2013;LSTM achieved the highest performance with 99.96% accuracy, 99.77% precision, 99.64% recall, and 99.64% F1-score, outperforming GRU&#x2013;DNN (99.94%, 99.65%, 99.49%, 99.49%) and CNN2D&#x2013;CNN3D (99.91%, 99.62%, 99.53%, 99.53%). ROC analysis is presented in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>. AUC values appear as 1.0 due to rounding, while the actual scores are 0.998163 (GRU&#x2013;LSTM), 0.997339 (GRU&#x2013;DNN), and 0.997881 (CNN2D&#x2013;CNN3D), indicating robust performance without overfitting and effective separation of benign and attack classes. Additionally, True Negative Rate (TNR), Matthews Correlation Coefficient (MCC), and Negative Predictive Value (NPV) were evaluated to assess anomaly detection capability (<xref ref-type="fig" rid="fig-5">Fig. 5</xref>). The proposed GRU&#x2013;LSTM achieved 99.98% TNR, 99.93% MCC, and 99.97% NPV, surpassing GRU&#x2013;DNN (99.97%, 99.90%, 99.96%) and CNN2D&#x2013;CNN3D (99.97%, 99.90%, 99.68%), demonstrating superior detection of malicious samples and overall classification reliability.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Performance metrics of the proposed algorithms. (<bold>a</bold>) Accuracy, Precision, Recall, and F1-Score (<bold>b</bold>) TNR, MCC, and NPV</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-3.tif"/>
</fig><fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>ROC-Curve of proposed GRU-LSTM, GRU-DNN and CNN2D-CNN3D</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-4.tif"/>
</fig><fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Performance metrics of the proposed hybrid algorithms. (<bold>a</bold>) FPR, FDR, FNR, FOR (<bold>b</bold>) BM, MK, TS (<bold>c</bold>) testing time</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_73577-fig-5.tif"/>
</fig>
<p>An effective model achieves low False Positive Rate (FPR), False Negative Rate (FNR), False Discovery Rate (FDR), and False Omission Rate (FOR). FPR indicates the proportion of benign samples misclassified as attacks, FNR the fraction of attacks misclassified as benign, FDR the proportion of false positives among predicted positives, and FOR the proportion of false negatives among predicted negatives. As shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, the proposed GRU&#x2013;LSTM achieved 0.0002% FPR, 0.0022% FNR, 0.0035% FDR, and 0.0002% FOR, outperforming GRU&#x2013;DNN (0.0002%, 0.0041%, 0.0034%, 0.0003%) and CNN2D&#x2013;CNN3D (0.0003%, 0.0045%, 0.0031%, 0.0003%), demonstrating high detection efficiency.</p>
<p>Global performance measures, including Bookmaker Informedness (BM), Markedness (MK), and Threat Score (TS), further validate model performance. As depicted in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, GRU&#x2013;LSTM achieved 99.63% BM, 99.74% MK, and 99.42% TS, outperforming GRU&#x2013;DNN (99.46%, 99.61%, 99.14%) and CNN2D&#x2013;CNN3D (99.50%, 99.59%, 99.16%), confirming its superior discriminative power and overall efficiency.</p>
<p>The testing time of the proposed algorithms is shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. Single-sample inference required 0.0021 ms for GRU&#x2013;LSTM, 0.0026 ms for GRU&#x2013;DNN, and 0.0012 ms for CNN2D&#x2013;CNN3D, measured using optimized TensorFlow GPU execution on a NVIDIA GTX 1050 Ti. These times correspond to single-sample inference and may vary for larger batches or full-pipeline evaluation. <xref ref-type="table" rid="table-7">Table 7</xref> provides a comparison of our work with the current state-of-the-art in terms of detection accuracy and time efficiency. This table clearly states the difference between existing work and our work by providing significant details that are adequate for comparison.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>The comparison of our results with others</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/> </colgroup>
<thead>
<tr>
<th>Parameters</th>
<th>Proposed work</th>
<th>Meidan [<xref ref-type="bibr" rid="ref-29">29</xref>]</th>
<th>McDermott [<xref ref-type="bibr" rid="ref-13">13</xref>]</th>
<th>Parra [<xref ref-type="bibr" rid="ref-31">31</xref>]</th>
</tr>
</thead>
<tbody>
<tr>
<td><bold>Dataset</bold></td>
<td>N_BaIoT</td>
<td>N_BaIoT</td>
<td>Self Generated</td>
<td>N_BaIoT</td>
</tr>
<tr>
<td><bold>Algorithm</bold></td>
<td>Hybrid GRU-LSTM</td>
<td>Autoencoder</td>
<td>BLSTM-RNN</td>
<td>LSTM, DCNN</td>
</tr>
<tr>
<td><bold>Binary_class</bold></td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
</tr>
<tr>
<td><bold>Multi_class</bold></td>
<td><inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr>
<td><bold>10-fold</bold></td>
<td><inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
<td><inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr>
<td><bold>Accuracy</bold></td>
<td>99.96</td>
<td>80</td>
<td>98.33</td>
<td>94.80</td>
</tr>
<tr>
<td><bold>Precision</bold></td>
<td>99.77</td>
<td>98.80</td>
<td>86.65</td>
<td>90.30</td>
</tr>
<tr>
<td><bold>Recall</bold></td>
<td>99.64</td>
<td>98.92</td>
<td>99.00</td>
<td>99.87</td>
</tr>
<tr>
<td><bold>F1-score</bold></td>
<td>99.64</td>
<td>98.92</td>
<td>99.00</td>
<td>97.28</td>
</tr>
<tr>
<td><bold>FPR</bold></td>
<td>0.0002</td>
<td>0.03</td>
<td><bold>&#x2013;</bold></td>
<td>0.0001</td>
</tr>
<tr>
<td><bold>Testing time</bold></td>
<td>0.2594 (ms)</td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
<td><bold>&#x2013;</bold></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table-7fn1" fn-type="other">
<p>Note: <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula> denotes a &#x2018;Yes&#x2019; response</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>The continued growth of IoT systems faces significant challenges due to the increasing sophistication and advancement of cyber attacks. Advanced malware-driven botnets have the potential to severely disrupt or even paralyze IoT ecosystems, while also serving as platforms for the propagation of additional malware across compromised networks. These threats underscore the urgent need for robust, adaptive, and intelligent security mechanisms to safeguard the integrity, availability, and privacy of IoT infrastructures. The authors present an efficient and highly effective hybrid DL framework to accurately identify multi-variant malware-driven botnet attacks in an IoT ecosystem. Besides, we have evaluated the proof of concept of employing numerous feature selection mechanisms that also contribute to the overall performance without provoking any real-time cost. Moreover, the proposed mechanism has been thoroughly tested with current hybrid DL benchmarks. Further, the devised scheme has been cross validated using standard k-fold validation mechanism to explicitly show unbiased performance. Our proposed mechanism shows promising results in terms of detection accuracy with a trivial trade-off in time complexity. In future work, we plan to extend the model to large-scale, heterogeneous IoT networks and incorporate transformer-based and agentic AI frameworks for improved scalability, while evaluating it on diverse datasets to validate its effectiveness in detecting, mitigating, and securing emerging IoT ecosystems.</p>
</sec>
<sec sec-type="supplementary-material" id="s7">
<title>Supplementary Materials</title>
<supplementary-material id="SD1">
<media xlink:href="CMC_73577-s001.zip"/>
</supplementary-material>
</sec>
</body>
<back>
<ack>
<p>Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2025R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>This research was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2025R97), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>Study conception and design: Maha Abdelhaq, Tooba Hasan, Adnan Akhunzada; Data collection: Maha Abdelhaq, Tooba Hasan; Analysis and interpretation of results: Maha Abdelhaq, Tooba Hasan, Adnan Akhunzada; Draft manuscript preparation: Maha Abdelhaq; Supervision, review, and editing: Adnan Akhunzada; Validation: Ahmad Sami Al-Shamayleh, Nikola Ivkovi&#x0107;; Funding acquisition: Nikola Ivkovi&#x0107;, Maha Abdelhaq, Ahmad Sami Al-Shamayleh. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>The dataset utilized in this study are publicly available and accessible at: <ext-link ext-link-type="uri" xlink:href="https://research.unsw.edu.au/projects/bot-iot-dataset">https://research.unsw.edu.au/projects/bot-iot-dataset</ext-link> (accessed on 04 August 2025).</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>Theauthors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<sec>
<title>Supplementary Materials</title>
<p>The supplementary material is available online at <ext-link ext-link-type="uri" xlink:href="https://www.techscience.com/doi/10.32604/cmc.2025.073577/s1">https://www.techscience.com/doi/10.32604/cmc.2025.073577/s1</ext-link>.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saadouni</surname> <given-names>C</given-names></string-name>, <string-name><surname>Jaouhari</surname> <given-names>SE</given-names></string-name>, <string-name><surname>Tamani</surname> <given-names>N</given-names></string-name>, <string-name><surname>Ziti</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mroueh</surname> <given-names>L</given-names></string-name>, <string-name><surname>Bouchti</surname> <given-names>KE</given-names></string-name></person-group>. <article-title>Identification techniques in the internet of things: survey, taxonomy and research frontier</article-title>. <source>IEEE Communicat Surv Tutor</source>. <year>2025</year>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2025.3541165</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Beltr&#x00E1;n-L&#x00F3;pez</surname> <given-names>P</given-names></string-name>, <string-name><surname>P&#x00E9;rez</surname> <given-names>MG</given-names></string-name>, <string-name><surname>Nespoli</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Cyber deception: taxonomy, state of the art, frameworks, trends, and open challenges</article-title>. <source>IEEE Communicat Surv Tutor</source>. <year>2025</year>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2025.3594788</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Garg</surname> <given-names>U</given-names></string-name>, <string-name><surname>Mishra</surname> <given-names>P</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>N</given-names></string-name>, <string-name><surname>Pilli</surname> <given-names>ES</given-names></string-name></person-group>. <article-title>IoT botnets unveiled: architectural analysis, threat vectors, and cutting-edge detection techniques</article-title>. <source>Cluster Comput</source>. <year>2025</year>;<volume>28</volume>(<issue>15</issue>):<fpage>945</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s10586-025-05633-1</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Maaz</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ahmed</surname> <given-names>G</given-names></string-name>, <string-name><surname>Sami Al-Shamayleh</surname> <given-names>A</given-names></string-name>, <string-name><surname>Akhunzada</surname> <given-names>A</given-names></string-name>, <string-name><surname>Siddiqui</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hussein Al-Ghushami</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Empowering IoT resilience: hybrid deep learning techniques for enhanced security</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>180597</fpage>&#x2013;<lpage>618</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2024.3482005</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farooq</surname> <given-names>MJ</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>Q</given-names></string-name></person-group>. <article-title>Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks</article-title>. <source>IEEE Transact Inform Foren Secur</source>. <year>2019</year>;<volume>14</volume>(<issue>9</issue>):<fpage>2412</fpage>&#x2013;<lpage>26</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tifs.2019.2898817</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shao</surname> <given-names>S</given-names></string-name>, <string-name><surname>Gu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Nie</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Ji</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ba</surname> <given-names>Z</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>An active defense adjudication method based on adaptive anomaly sensing for mimic IoT</article-title>. <source>IEEE Transact Serv Comput</source>. <year>2025</year>;<volume>18</volume>(<issue>1</issue>):<fpage>57</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tsc.2024.3436673</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Taheri</surname> <given-names>R</given-names></string-name>, <string-name><surname>Shojafar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Arabikhan</surname> <given-names>F</given-names></string-name>, <string-name><surname>Gegov</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Unveiling vulnerabilities in deep learning-based malware detection: differential privacy driven adversarial attacks</article-title>. <source>Comput Secur</source>. <year>2024</year>;<volume>146</volume>:<fpage>104035</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.cose.2024.104035</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Eslamnejad</surname> <given-names>M</given-names></string-name>, <string-name><surname>Taheri</surname> <given-names>R</given-names></string-name>, <string-name><surname>Shojafar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bader-El-Den</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Federated learning-based robust android malware detection: label-flipping attacks and defenses</article-title>. <source>Neural Comput Appl</source>. <year>2025</year>;<volume>37</volume>(<issue>32</issue>):<fpage>27057</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s00521-025-11656-x</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Akhunzada</surname> <given-names>A</given-names></string-name>, <string-name><surname>Al-Shamayleh</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Zeadally</surname> <given-names>S</given-names></string-name>, <string-name><surname>Almogren</surname> <given-names>A</given-names></string-name>, <string-name><surname>Abu-Shareha</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles</article-title>. <source>Comput Elect Eng</source>. <year>2024</year>;<volume>119</volume>(<issue>1</issue>):<fpage>109609</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.compeleceng.2024.109609</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Shurbaji</surname> <given-names>T</given-names></string-name>, <string-name><surname>Anbar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Manickam</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hasbullah</surname> <given-names>IH</given-names></string-name>, <string-name><surname>Alfriehat</surname> <given-names>N</given-names></string-name>, <string-name><surname>Alabsi</surname> <given-names>BA</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Deep learning-based intrusion detection system for detecting IoT botnet attacks: a review</article-title>. <source>IEEE Access</source>. <year>2025</year>;<volume>13</volume>:<fpage>11792</fpage>&#x2013;<lpage>822</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2025.3526711</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Benson</surname> <given-names>T</given-names></string-name>, <string-name><surname>Chandrasekaran</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Sounding the bell for improving internet (of things) security</article-title>. In: <conf-name>Proceedings of the 2017 Workshop on Internet of Things Security and Privacy</conf-name>. <publisher-loc>New York, NY, USA</publisher-loc>: <publisher-name>ACM</publisher-name>; <year>2017</year>. p. <fpage>77</fpage>&#x2013;<lpage>82</lpage>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Torres</surname> <given-names>P</given-names></string-name>, <string-name><surname>Catania</surname> <given-names>C</given-names></string-name>, <string-name><surname>Garcia</surname> <given-names>S</given-names></string-name>, <string-name><surname>Garino</surname> <given-names>CG</given-names></string-name></person-group>. <article-title>An analysis of recurrent neural networks for botnet detection behavior</article-title>. In: <conf-name>2016 IEEE biennial congress of Argentina (ARGENCON)</conf-name>. <publisher-loc>Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2016</year>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi:<pub-id pub-id-type="doi">10.1109/argencon.2016.7585247</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>McDermott</surname> <given-names>CD</given-names></string-name>, <string-name><surname>Majdani</surname> <given-names>F</given-names></string-name>, <string-name><surname>Petrovski</surname> <given-names>AV</given-names></string-name></person-group>. <article-title>Botnet detection in the internet of things using deep learning approaches</article-title>. In: <conf-name>2018 International Joint Conference on Neural Networks (IJCNN)</conf-name>. <publisher-loc>Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2018</year>. p. <fpage>1</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pekta&#x015F;</surname> <given-names>A</given-names></string-name>, <string-name><surname>Acarman</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Botnet detection based on network flow summary and deep learning</article-title>. <source>Int J Netw Manag</source>. <year>2018</year>;<volume>28</volume>(<issue>6</issue>):<fpage>e2039</fpage>. doi:<pub-id pub-id-type="doi">10.1002/nem.2039</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kudugunta</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ferrara</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Deep neural networks for bot detection</article-title>. <source>Inform Sci</source>. <year>2018</year>;<volume>467</volume>:<fpage>312</fpage>&#x2013;<lpage>22</lpage>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vinayakumar</surname> <given-names>R</given-names></string-name>, <string-name><surname>Soman</surname> <given-names>K</given-names></string-name>, <string-name><surname>Poornachandran</surname> <given-names>P</given-names></string-name>, <string-name><surname>Sachin Kumar</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Evaluating deep learning approaches to characterize and classify the DGAs at scale</article-title>. <source>J Intell Fuzzy Syst</source>. <year>2018</year>;<volume>34</volume>(<issue>3</issue>):<fpage>1265</fpage>&#x2013;<lpage>76</lpage>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>LeCun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Bengio</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Hinton</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Deep learning</article-title>. <source>Nature</source>. <year>2015</year>;<volume>521</volume>(<issue>7553</issue>):<fpage>436</fpage>. doi:<pub-id pub-id-type="doi">10.1038/nature14539</pub-id>; <pub-id pub-id-type="pmid">26017442</pub-id></mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chaganti</surname> <given-names>R</given-names></string-name>, <string-name><surname>Suliman</surname> <given-names>W</given-names></string-name>, <string-name><surname>Ravi</surname> <given-names>V</given-names></string-name>, <string-name><surname>Dua</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Deep learning approach for SDN-enabled intrusion detection system in IoT networks</article-title>. <source>Information</source>. <year>2023</year>;<volume>14</volume>(<issue>1</issue>):<fpage>41</fpage>. doi:<pub-id pub-id-type="doi">10.3390/info14010041</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sattari</surname> <given-names>F</given-names></string-name>, <string-name><surname>Farooqi</surname> <given-names>AH</given-names></string-name>, <string-name><surname>Qadir</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Raza</surname> <given-names>B</given-names></string-name>, <string-name><surname>Nazari</surname> <given-names>H</given-names></string-name>, <string-name><surname>Almutiry</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A hybrid deep learning approach for bottleneck detection in IoT</article-title>. <source>IEEE Access</source>. <year>2022</year>;<volume>10</volume>:<fpage>77039</fpage>&#x2013;<lpage>53</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2022.3188635</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Diro</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Chilamkurti</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Distributed attack detection scheme using deep learning approach for Internet of Things</article-title>. <source>Future Generat Comput Syst</source>. <year>2018</year>;<volume>82</volume>:<fpage>761</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2017.08.043</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wani</surname> <given-names>A</given-names></string-name>, <string-name><surname>Khaliq</surname> <given-names>R</given-names></string-name></person-group>. <article-title>SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL)</article-title>. <source>CAAI Transact Intell Technol</source>. <year>2021</year>;<volume>6</volume>(<issue>3</issue>):<fpage>281</fpage>&#x2013;<lpage>90</lpage>. doi:<pub-id pub-id-type="doi">10.1049/cit2.12003</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Hasan</surname> <given-names>T</given-names></string-name>, <string-name><surname>Akhunzada</surname> <given-names>A</given-names></string-name>, <string-name><surname>Giannetsos</surname> <given-names>T</given-names></string-name>, <string-name><surname>Malik</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Orchestrating SDN control plane towards enhanced IoT security</article-title>. In: <conf-name>2020 6th IEEE Conference on Network Softwarization (NetSoft)</conf-name>. <publisher-loc>Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2020</year>. p. <fpage>457</fpage>&#x2013;<lpage>64</lpage>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Chung</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gulcehre</surname> <given-names>C</given-names></string-name>, <string-name><surname>Cho</surname> <given-names>K</given-names></string-name>, <string-name><surname>Bengio</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Empirical evaluation of gated recurrent neural networks on sequence modeling</article-title>. <comment>arXiv:1412.3555. 2014</comment>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Dey</surname> <given-names>R</given-names></string-name>, <string-name><surname>Salemt</surname> <given-names>FM</given-names></string-name></person-group>. <article-title>Gate-variants of gated recurrent unit (GRU) neural networks</article-title>. In: <conf-name>2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)</conf-name>. <publisher-loc>Piscataway, NJ, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2017</year>. p. <fpage>1597</fpage>&#x2013;<lpage>600</lpage>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Kostadinov</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Understanding GRU Networks [Internet]</article-title>. <year>2017</year> <comment>[cited 2025 Nov 1]</comment>. Available from: <ext-link ext-link-type="uri" xlink:href="https://towardsdatascience.com/understanding-gru-networks-2ef37df6c9be">https://towardsdatascience.com/understanding-gru-networks-2ef37df6c9be</ext-link>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hochreiter</surname> <given-names>S</given-names></string-name>, <string-name><surname>Schmidhuber</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Long short-term memory</article-title>. <source>Neural Computation</source>. <year>1997</year>;<volume>9</volume>(<issue>8</issue>):<fpage>1735</fpage>&#x2013;<lpage>80</lpage>. doi:<pub-id pub-id-type="doi">10.1162/neco.1997.9.8.1735</pub-id>; <pub-id pub-id-type="pmid">9377276</pub-id></mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Jacovi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shalom</surname> <given-names>OS</given-names></string-name>, <string-name><surname>Goldberg</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Understanding convolutional neural networks for text classification</article-title>. <comment>arXiv:1809.08037. 2018</comment>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Montavon</surname> <given-names>G</given-names></string-name>, <string-name><surname>Samek</surname> <given-names>W</given-names></string-name>, <string-name><surname>M&#x00FC;ller</surname> <given-names>KR</given-names></string-name></person-group>. <article-title>Methods for interpreting and understanding deep neural networks</article-title>. <source>Digital Signal Process</source>. <year>2018</year>;<volume>73</volume>:<fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.dsp.2017.10.011</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Meidan</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Bohadana</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mathov</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Mirsky</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Shabtai</surname> <given-names>A</given-names></string-name>, <string-name><surname>Breitenbacher</surname> <given-names>D</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>N-BaIoT&#x2014;network-based detection of IoT botnet attacks using deep autoencoders</article-title>. <source>IEEE Pervas Comput</source>. <year>2018</year>;<volume>17</volume>(<issue>3</issue>):<fpage>12</fpage>&#x2013;<lpage>22</lpage>. doi:<pub-id pub-id-type="doi">10.1109/mprv.2018.03367731</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hall</surname> <given-names>M</given-names></string-name>, <string-name><surname>Frank</surname> <given-names>E</given-names></string-name>, <string-name><surname>Holmes</surname> <given-names>G</given-names></string-name>, <string-name><surname>Pfahringer</surname> <given-names>B</given-names></string-name>, <string-name><surname>Reutemann</surname> <given-names>P</given-names></string-name>, <string-name><surname>Witten</surname> <given-names>IH</given-names></string-name></person-group>. <article-title>The WEKA data mining software: an update</article-title>. <source>ACM SIGKDD Explorat Newsletter</source>. <year>2009</year>;<volume>11</volume>(<issue>1</issue>):<fpage>10</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1145/1656274.1656278</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Parra</surname> <given-names>GDLT</given-names></string-name>, <string-name><surname>Rad</surname> <given-names>P</given-names></string-name>, <string-name><surname>Choo</surname> <given-names>KKR</given-names></string-name>, <string-name><surname>Beebe</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Detecting Internet of Things attacks using distributed deep learning</article-title>. <source>J Netw Comput Appl</source>. <year>2020</year>;<volume>163</volume>:<fpage>102662</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jnca.2020.102662</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>