As an extension of cloud services to the edge, Fog computing is a current paradigm for latency-sensitive and resource-constrained applications. Nevertheless, its distributed architecture makes it vulnerable to sophisticated cybersecurity threats, especially botnet assaults. To tackle this problem, we propose a reinforcement learning–enhanced deep learning framework for multi-class classification of botnet attacks in a fog computing environment. At the heart of our approach is a Bidirectional Long Short-Term Memory (BiLSTM) network, a well-known sequential data modeling network. Reinforcement learning based feature selection was used to find and retain the best relevant set of attributes such that detection can be maximized. We performed extensive experimentation and evaluated over four cross-validation folds using a real-life dataset. This proposed model consistently proved micro-averaged precision, recall, F-score, and accuracy greater than 95% on all classes — namely High, Moderate, Low, and Normal attack intensities — over three benchmarked datasets, BADD, RLUF, and DIBCA. Particularly, precision and sensitivity scores were relatively close to perfect, ranging from near-perfect scores for higher severity attacks in terms of detection and false alarms. By proving that deep learning can be further improved by incorporating reinforced feature optimization, this study provides evidence that deep learning can be further boosted to assist in fog networks with deep botnet detection. The proposed framework is ready to adapt, efficient, and holds great promise for real-time intrusion detection based on Internet of Things (IoT) backed fog infrastructures.
100
75
43
100
75
43
100
75
43
Copyright © 2025, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Corresponding Author: Surya Pavan Kumar Gudla, pavan1980.mca@gmail.com Preeti Nutipalli, preethinutipalli7@gmail.com
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Or share your Opinion
This paper presents the design of a circular split ring resonator (CSRR) loaded high gain slotted rectangular microstrip...
The world's food supply relies on individual with small holding farmers, but these farmers frequently lack access to...
Women Safety is one of the challenging areas in daily life’s, and it has led to different security...
Medicine dispensing at hospitals is one of the challenging issue at healthcare management. It has led to the...
This paper proposes a novel technique for reducing crossover disturbances, consumption of electricity, Power Delay Product (PDP), and...
Driver fatigue and drowsiness are major causes of road accidents worldwide, emphasizing the need for an efficient and...
Phishing is one of the most prevalent cyber threats, where attackers deceive users through fraudulent websites or URLs...
The world's food supply relies on individual with small holding farmers, but these farmers frequently lack access to...
Comments(0)