Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/32555Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Al-Jamali, NAS | - |
| dc.contributor.author | Zarzoor, AR | - |
| dc.contributor.author | Al-Raweshidy, HS | - |
| dc.date.accessioned | 2025-12-23T17:05:43Z | - |
| dc.date.available | 2025-12-23T17:05:43Z | - |
| dc.date.issued | 2025-10-25 | - |
| dc.identifier | ORCiD: Hamed S. Al-Raweshidy https://orcid.org/0000-0002-3702-8192 | - |
| dc.identifier | Article number: e70019 | - |
| dc.identifier.citation | Al-Jamali, N.A.S., Zarzoor, A.R. and Al-Raweshidy, H.S. (2025) 'An Effective Technique of Zero-Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method', IET Networks, 14 (1), e70019, pp. 1 - 12. doi: 10.1049/ntw2.70019. | - |
| dc.identifier.issn | 2047-4954 | - |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/32555 | - |
| dc.description | Data Availability Statement: The data that support the findings of this study are available from the corresponding author upon reasonable request. | - |
| dc.description.abstract | The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature-based datasets often perform poorly in ZD detection. A new technique for detecting zero-day (ZD) attacks in IoT-based Conventional Spiking Neural Networks (CSNN), termed ZD-CSNN, is proposed. The model comprises three key levels: (1) Data Pre-processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and the most recent attack patterns in network traffic, ensuring data quality for analysis, (2) CSNN-based Detection, where outlier identification is conducted by comparing two dataset groups (the normal set and the attack set) within the same time period to enhance anomaly detection and (3) In the evaluation level, the detection performance of the proposed model is assessed by comparing it with two benchmark models: ZD-Deep Learning (ZD-DL) and ZD- Convolutional Neural Network (ZD-CNN). The implementation results demonstrate that ZD- CSNN achieves superior accuracy in detecting zero-day attacks compared to both ZD-DL and ZD-CNN. | - |
| dc.description.sponsorship | This research was supported by the Brunel University London. | - |
| dc.format.extent | 1 - 12 | - |
| dc.format.medium | Print-Electronic | - |
| dc.language | English | - |
| dc.publisher | Wiley on behalf of The Institution of Engineering and Technology | - |
| dc.rights | Creative Commons Attribution 4.0 International | - |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | - |
| dc.subject | cryptography | - |
| dc.subject | internet of things | - |
| dc.subject | next generation networks | - |
| dc.title | An Effective Technique of Zero-Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method | - |
| dc.type | Journal Article | - |
| dc.date.dateAccepted | 2025-10-03 | - |
| dc.identifier.doi | https://doi.org/10.1049/ntw2.70019 | - |
| dc.relation.isPartOf | IET Networks | - |
| pubs.issue | 1 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 14 | - |
| dc.identifier.eissn | 2047-4962 | - |
| dc.identifier.eissn | 2047-4962 | - |
| dc.rights.license | https://creativecommons.org/licenses/by/4.0/legalcode.en | - |
| dcterms.dateAccepted | 2025-10-03 | - |
| dc.rights.holder | The Author(s) | - |
| dc.contributor.orcid | Hamed S. Al-Raweshidy [0000-0002-3702-8192] | - |
| Appears in Collections: | Dept of Electronic and Electrical Engineering Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FullText.pdf | Copyright © 2025 The Author(s). IET Networks published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. This is an open access article under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits use, distribution and reproduction in any medium, provided the original work is properly cited. | 1.09 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License