Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations

被引:0
|
作者
Do, Phuc Hao [1 ,2 ]
Le, Tran Duc [3 ]
Dinh, Truong Duy [4 ]
Pham, Van Dai [5 ]
机构
[1] Bonch Bruevich St Petersburg State Univ Telecommun, St Petersburg 193232, Russia
[2] Danang Architecture Univ, Da Nang, Vietnam
[3] Univ Wisconsin Stout, Menomonie, WI 54751 USA
[4] Posts & Telecommun Inst Technol, Hanoi, Vietnam
[5] FPT Univ, Swinburne Vietnam, Hanoi, Vietnam
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Internet of Things; Botnet; Accuracy; Adaptation models; Analytical models; Real-time systems; Long short term memory; Biological system modeling; Neurons; Splines (mathematics); Cybersecurity; IoT botnet detection; Kolmogorov-Arnold networks; network intrusion detection; AUTHORIZATION USAGE CONTROL; SAFETY DECIDABILITY;
D O I
10.1109/ACCESS.2025.3528940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid expansion of devices on the Internet of Things (IoTs) has led to a significant rise in IoT botnet attacks, creating an urgent need for advanced detection and classification methods. This study aims to evaluate the effectiveness of Kolmogorov-Arnold Networks (KANs) and their architectural variations in classifying IoT botnet attacks, comparing their performance with traditional machine learning and deep learning models. We conducted a comparative analysis of five KAN architectures, including Original-KAN, Fast-KAN, Jacobi-KAN, Deep-KAN, and Chebyshev-KAN, against models like Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and Gated Recurrent Units (GRU). The evaluation was performed on three IoT botnet datasets: N-BaIoT, IoT23, and IoT-BotNet, using metrics such as accuracy, precision, recall, F1-score, training time, and model complexity. KAN variants consistently demonstrated robust performance, often exceeding traditional ML and DL models in accuracy and stability across all datasets. The Original-KAN variant, in particular, excelled in capturing complex, non-linear patterns inherent in IoT botnet traffic, achieving higher accuracy and faster convergence rates. Variations such as Fast-KAN and Deep-KAN offered favorable trade-offs between computational efficiency and modeling capacity, making them suitable for real-time and resource-constrained IoT environments. Kolmogorov-Arnold Networks prove to be highly effective for IoT botnet classification, outperforming conventional models and offering significant advantages in adaptability and accuracy. The integration of KAN-based models into existing cybersecurity frameworks can enhance the detection and mitigation of sophisticated botnet threats, thus contributing to more resilient and secure IoT ecosystems.
引用
收藏
页码:16072 / 16093
页数:22
相关论文
共 50 条
  • [1] CKAN: Convolutional Kolmogorov-Arnold Networks Model for Intrusion Detection in IoT Environment
    Abd Elaziz, Mohamed
    Fares, Ibrahim Ahmed
    Aseeri, Ahmad O.
    IEEE ACCESS, 2024, 12 : 134837 - 134851
  • [2] Secure IoT sensor networks through advanced anomaly detection with Kolmogorov-Arnold Networks (KANs)
    Mishra, Shreshtha
    Jain, Usha
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2025,
  • [3] Kolmogorov-Arnold networks in nuclear binding energy prediction
    Liu, Hao
    Lei, Jin
    Ren, Zhongzhou
    PHYSICAL REVIEW C, 2025, 111 (02)
  • [4] Kolmogorov-Arnold Networks for Semi-Supervised Impedance Inversion
    Liu, Mingming
    Bossmann, Florian
    Ma, Jianwei
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2025, 22
  • [5] An intrusion detection model based on Convolutional Kolmogorov-Arnold Networks
    Wang, Zhen
    Zainal, Anazida
    Siraj, Maheyzah Md
    Ghaleb, Fuad A.
    Hao, Xue
    Han, Shaoyong
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [6] SineKAN: Kolmogorov-Arnold Networks using sinusoidal activation functions
    Reinhardt, Eric
    Ramakrishnan, Dinesh
    Gleyzer, Sergei
    FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2025, 7
  • [7] Deep reinforcement learning with dual-Q and Kolmogorov-Arnold Networks for computation offloading in Industrial IoT
    Wu, Jinru
    Du, Ruizhong
    Wang, Ziyuan
    COMPUTER NETWORKS, 2025, 257
  • [8] Solution of an Inverse Problem of Optical Spectroscopy Using Kolmogorov-Arnold Networks
    Kupriyanov, G.
    Isaev, I.
    Laptinskiy, K.
    Dolenko, T.
    Dolenko, S.
    OPTICAL MEMORY AND NEURAL NETWORKS, 2024, 33 (SUPPL3) : S475 - S482
  • [9] FloodKAN: Integrating Kolmogorov-Arnold Networks for Efficient Flood Extent Extraction
    Wang, Cong
    Zhang, Xiaohan
    Liu, Liwei
    REMOTE SENSING, 2025, 17 (04)
  • [10] How Resilient Are Kolmogorov-Arnold Networks in Classification Tasks? A Robustness Investigation
    Ibrahum, Ahmed Dawod Mohammed
    Shang, Zhengyu
    Hong, Jang-Eui
    APPLIED SCIENCES-BASEL, 2024, 14 (22):