Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques

被引:0
|
作者
Asghar, Muhammad Nabeel [1 ,2 ]
Raza, Muhammad Asif [2 ]
Murad, Zara
Alyahya, Ahmed [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Al Hufuf, Saudi Arabia
[2] Bahauddin Zakariya Univ, Dept Comp Sci, Multan, Pakistan
来源
IPSI BGD TRANSACTIONS ON INTERNET RESEARCH | 2024年 / 20卷 / 01期
关键词
Internet of Things; Machine Learning; LR; SVM; RF; Botnet; TCP; UDP; Bashlite; Mirai;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed notoriety for its involvement in large-scale attacks that compromised numerous IoT devices through also known as Gafgyt or Lizkebab, targets vulnerable IoT devices by exploiting the Shellshock vulnerability in Linux-based systems. These botnets leverage compromised devices to carry out malicious activities and the propagation of malware. have been proposed to identify botnets, however, simultaneously is challenging as their attack characteristics are not very similar. In this study, we apply ML techniques like Logistic Regression, Support Vector Machine and Random Forest to classify the malicious traffic from Mirai and Bashlite botnets. The publicly available NBaIoT dataset is used for the training of algorithms to identify the most informative features to detect contains traffic data from nine infected devices against five protocols. The employed machine accuracy above 99%, with Random Forest performing the best. Our analysis shows that characteristics like weight or variance calculated within a certain time window.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 50 条
  • [31] Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
    P. E. Yugai
    E. V. Zhukovskii
    P. O. Semenov
    Automatic Control and Computer Sciences, 2023, 57 : 968 - 974
  • [32] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
    Nazir, Ahsan
    He, Jingsha
    Zhu, Nafei
    Wajahat, Ahsan
    Ma, Xiangjun
    Ullah, Faheem
    Qureshi, Sirajuddin
    Pathan, Muhammad Salman
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [33] A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks
    Wang, Fang
    Wei, Zhe
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) : 1084 - 1087
  • [34] EMTD: Explainable Malicious Traffic Detection Model Using Hybrid Deep Learning Techniques for Industrial IoT Networks
    Dey, Arun Kumar
    Gupta, Govind P.
    Sahu, Satya Prakash
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024,
  • [35] Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
    Al-Mohammed, Hasan Abbas
    Al-Ali, Afnan
    Yaacoub, Elias
    Qidwai, Uvais
    Abualsaud, Khalid
    Rzewuski, Stanislaw
    Flizikowski, Adam
    IEEE ACCESS, 2021, 9 : 136994 - 137004
  • [36] Comparing Deep Neural Networks and Machine Learning for Detecting Malicious Domain Name Registrations
    Colhak, Furkan
    Ecevit, Mert Ilhan
    Dag, Hasan
    Creutzburg, Reiner
    2024 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS, COINS 2024, 2024, : 82 - 85
  • [37] Detecting IoT Botnet Attacks Using Machine Learning Methods
    Okur, Celil
    Dener, Murat
    2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 31 - 37
  • [38] Detecting IoT Attacks Using an Ensemble Machine Learning Model
    Tomer, Vikas
    Sharma, Sachin
    FUTURE INTERNET, 2022, 14 (04):
  • [39] A Comparison of Machine Learning Attributes for Detecting Malicious Websites
    Singh, A. K.
    Goyal, Navneet
    2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 387 - 393
  • [40] DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING
    Jiang, Jianguo
    Song, Nan
    Yu, Min
    Chow, Kam-Pui
    Li, Gang
    Liu, Chao
    Huang, Weiqing
    ADVANCES IN DIGITAL FORENSICS XVII, 2021, 612 : 135 - 155