Even while new technologies are being developed to aid in the evolution of humanity, their security systems still include holes that might be exploited by those who want to steal or damage the data of others. An example of a typical security issue is the usage of passwords for devices that are either too easy to crack or too simple for users to remember. Botnets are a method employed by hostile actors; they are networks of compromised devices that may be used to execute orders. Botnets are networks of compromised computing equipment. As a direct result, problems surrounding the security of the Internet of Things (IoT) must be addressed. According to, there can be as many as 26 billion Internet of Things (IoT) devices linked to the internet by the year 2020. Therefore, it is necessary to develop solutions for securing the Internet of Things' security (IoT) (IoT). In many network environments, intrusion detection systems act as the first line of defense for network security. In these sorts of systems, the process of tagging databases needs a considerable investment of both computing and human resources. During the dataset preparation phase, also known as step 1, this technique's algorithm picks features based on the properties of the data sets in order to organize them in decreasing order of their degree of similarity. This method is called as feature selection. DoS, R2L, U2R, and probing are among the four types of attacks that are included in the KDD CUP 99(KDD) dataset, which was intended for testing IDS. There are 41 KDD properties that are unique to every TCP connection. These aspects are traffic, basic, and content. KDD is utilized in intrusion detection data mining and machine learning research..
| Primary Language | English |
|---|---|
| Subjects | Electrical Circuits and Systems |
| Journal Section | Research Article |
| Authors | |
| Publication Date | June 30, 2025 |
| Submission Date | September 30, 2023 |
| Acceptance Date | June 18, 2025 |
| Published in Issue | Year 2025 Volume: 9 Issue: 1 |
.