Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques

被引:0
|
作者
Asghar, Muhammad Nabeel [1 ,2 ]
Raza, Muhammad Asif [2 ]
Murad, Zara
Alyahya, Ahmed [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Al Hufuf, Saudi Arabia
[2] Bahauddin Zakariya Univ, Dept Comp Sci, Multan, Pakistan
来源
IPSI BGD TRANSACTIONS ON INTERNET RESEARCH | 2024年 / 20卷 / 01期
关键词
Internet of Things; Machine Learning; LR; SVM; RF; Botnet; TCP; UDP; Bashlite; Mirai;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed notoriety for its involvement in large-scale attacks that compromised numerous IoT devices through also known as Gafgyt or Lizkebab, targets vulnerable IoT devices by exploiting the Shellshock vulnerability in Linux-based systems. These botnets leverage compromised devices to carry out malicious activities and the propagation of malware. have been proposed to identify botnets, however, simultaneously is challenging as their attack characteristics are not very similar. In this study, we apply ML techniques like Logistic Regression, Support Vector Machine and Random Forest to classify the malicious traffic from Mirai and Bashlite botnets. The publicly available NBaIoT dataset is used for the training of algorithms to identify the most informative features to detect contains traffic data from nine infected devices against five protocols. The employed machine accuracy above 99%, with Random Forest performing the best. Our analysis shows that characteristics like weight or variance calculated within a certain time window.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 50 条
  • [11] Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches
    Asadi, Mehdi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (12) : 5547 - 5561
  • [12] The limitations of unsupervised machine learning for identifying malicious nodes in IoT networks
    Sadek, Fatima Salma
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1984 - 1989
  • [13] An Intelligent Detection of Malicious Intrusions in IoT Based on Machine Learning and Deep Learning Techniques
    Iftikhar, Saman
    Khan, Danish
    Al-Madani, Daniah
    Alheeti, Khattab M. Ali
    Fatima, Kiran
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2022, 30 (03) : 288 - 307
  • [14] CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad
    Tian, Zhihong
    Bashir, Ali Kashif
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05): : 3242 - 3254
  • [15] Detecting Malicious Driving with Machine Learning
    Yardy, Kevin
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [16] Detecting IoT Botnets on IoT Edge Devices
    Raghavendra, Meghana
    Chen, Zesheng
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 373 - 378
  • [17] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Parnika Bhat
    Sunny Behal
    Kamlesh Dutta
    Proceedings of the Indian National Science Academy, 2023, 89 : 429 - 444
  • [18] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2023, 89 (03): : 429 - 444
  • [19] Structural analysis and detection of android botnets using machine learning techniques
    Kirubavathi, G.
    Anitha, R.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (02) : 153 - 167
  • [20] Detecting malicious activity in Twitter using deep learning techniques
    Ilias, Loukas
    Roussaki, Ioanna
    APPLIED SOFT COMPUTING, 2021, 107