Smart City Gnosys

Smart city article details

Title Memory-Efficient And Robust Detection Of Mirai Botnet For Future 6G-Enabled Iot Networks
ID_Doc 36711
Authors Alwaisi Z.
Year 2025
Published Internet of Things (The Netherlands), 32
DOI http://dx.doi.org/10.1016/j.iot.2025.101621
Abstract The rise of 6G-enabled IoT networks has introduced significant challenges in securing resource-constrained devices against high-memory and energy-intensive cyber threats, such as the Mirai botnet. Due to their computational and memory overhead, existing Intrusion Detection Systems (IDS) and deep learning-based security mechanisms are often impractical for constrained IoT environments. This study proposes a TinyML-based real-time anomaly detection framework to classify and detect four distinct Mirai botnet attack types: Scan, UDP flooding, TCP flooding, and ACK flooding while analysing their impact on IoT device memory consumption and security. To address the trade-off between detection accuracy, memory efficiency, and inference time, Naïve Bayes (NB), Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbours (KNN) classifiers optimized for TinyML deployment are implemented and compared. Experimental results demonstrate that KNN achieves detection accuracy above 99%, while maintaining low memory usage, making it the most suitable choice for real-time security in constrained IoT environments. Conversely, NB and RF offer superior inference speed with lower computational overhead, presenting a trade-off between detection latency and resource efficiency. Additionally, analysis reveals that Mirai botnet-induced memory consumption leads to increased fragmentation, excessive RAM usage, and higher energy consumption, highlighting the need for adaptive security mechanisms. This framework provides a lightweight, memory-efficient solution for enhancing security in 6G-enabled IoT ecosystems, with potential applications in smart cities, smart homes, and Industry 4.0. By integrating memory-aware ML models, this work contributes critical insights into developing scalable cybersecurity frameworks to ensure resilience against evolving cyber threats. © 2025 Elsevier B.V.
Author Keywords 6G security; Anomaly detection; Internet of Things (IoT); Machine learning; Memory efficiency; Mirai botnet; Smart devices


Similar Articles


Id Similarity Authors Title Published
23730 View0.889Sharma A.; Rani S.Enhancing 6G-Iot Network Security: A Trustworthy And Responsible Ai-Driven Stacked-Hybrid Model For Attack DetectionIEEE Internet of Things Journal (2025)
295 View0.888Sadhwani S.; Mathur A.; Muthalagu R.; Pawar P.M.5G-Siid: An Intelligent Hybrid Ddos Intrusion Detector For 5G Iot NetworksInternational Journal of Machine Learning and Cybernetics, 16, 2 (2025)
34132 View0.883Ashraf, J; Keshk, M; Moustafa, N; Abdel-Basset, M; Khurshid, H; Bakhshi, AD; Mostafa, RRIotbot-Ids: A Novel Statistical Learning-Enabled Botnet Detection Framework For Protecting Networks Of Smart CitiesSUSTAINABLE CITIES AND SOCIETY, 72 (2021)
23927 View0.881Khan W.; Usama M.; Khan M.S.; Saidani O.; Al Hamadi H.; Alnazzawi N.; Alshehri M.S.; Ahmad J.Enhancing Security In 6G-Enabled Wireless Sensor Networks For Smart Cities: A Multi-Deep Learning Intrusion Detection ApproachFrontiers in Sustainable Cities, 7 (2025)
33508 View0.874Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
35958 View0.871Lefoane M.; Ghafir I.; Kabir S.; Awan I.-U.Machine Learning For Botnet Detection: An Optimized Feature Selection ApproachACM International Conference Proceeding Series (2021)
47763 View0.87Alotaibi A.; Barnawi A.Securing Massive Iot In 6G: Recent Solutions, Architectures, Future DirectionsInternet of Things (Netherlands), 22 (2023)
5218 View0.87Haider Z.A.; Zeb A.; Rahman T.; Singh S.K.; Akram R.; Arishi A.; Ullah I.A Survey On Anomaly Detection In Iot: Techniques, Challenges, And Opportunities With The Integration Of 6GComputer Networks, 270 (2025)
36080 View0.868Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
2052 View0.868Elsayed R.; Hamada R.; Hammoudeh M.; Abdalla M.; Elsaid S.A.A Hierarchical Deep Learning-Based Intrusion Detection Architecture For Clustered Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)