Skip to main content

2021 | OriginalPaper | Buchkapitel

A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes

verfasst von : M. Shobana, Sugumaran Poonkuzhali

Erschienen in: Service-Oriented Computing – ICSOC 2020 Workshops

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Over the evolution of internet technology give rise to the intelligence among tiny objects so called IoT devices. At the same time, this scenario increases the intrusion of malwares into the IoT devices e.g. Mirai, bashlite. Researchers have proposed many framework by addressing this issue. But the framework of those proposed work which are tested using Real time traffic of IoT devices is very fewer. In this work, the class imbalance problem has been identified in the BoT-IoT dataset. This problem is overcome by the random over sampling technique. Then this resultant dataset is further classified into normal and attack traffic using three machine learning classifier such as Support Vector Machine, Naive Bayes, and Decision Tree (j48) and deep learning technique such as deep neural network. The performance of the security model is evaluated using quality metrics like Precision, Recall, F-measure, Response time and ROC to identify the best classifier which is apt to detect malware in IoT devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alghuried, A.: A model for anomalies detection in Internet of Things (IoT) using inverse weight clustering and decision tree (2017) Alghuried, A.: A model for anomalies detection in Internet of Things (IoT) using inverse weight clustering and decision tree (2017)
2.
Zurück zum Zitat Andročec, D., Vrček, N.: Machine learning for the Internet of Things security: a systematic. In: 13th International Conference on Software Technologies, vol. 4120, p. 97060 (2018). https://doi.org/10.5220/00068 Andročec, D., Vrček, N.: Machine learning for the Internet of Things security: a systematic. In: 13th International Conference on Software Technologies, vol. 4120, p. 97060 (2018). https://​doi.​org/​10.​5220/​00068
3.
Zurück zum Zitat Angrishi, K.: Turning Internet of Things (IoT) into internet of vulnerabilities (IoV): IoT botnets. arXiv preprint arXiv:1702.03681 (2017) Angrishi, K.: Turning Internet of Things (IoT) into internet of vulnerabilities (IoV): IoT botnets. arXiv preprint arXiv:​1702.​03681 (2017)
4.
Zurück zum Zitat Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)CrossRef Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)CrossRef
5.
Zurück zum Zitat Bezerra, V.H., da Costa, V.G.T., Junior, S.B., Miani, R.S., Zarpelao, B.B.: One-class classification to detect botnets in IoT devices. In: Anais Principais do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 43–56. SBC (2018) Bezerra, V.H., da Costa, V.G.T., Junior, S.B., Miani, R.S., Zarpelao, B.B.: One-class classification to detect botnets in IoT devices. In: Anais Principais do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 43–56. SBC (2018)
6.
Zurück zum Zitat Chawathe, S.S.: Monitoring IoT networks for botnet activity. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–8. IEEE (2018) Chawathe, S.S.: Monitoring IoT networks for botnet activity. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–8. IEEE (2018)
7.
Zurück zum Zitat Domb, M., Bonchek-Dokow, E., Leshem, G.: Lightweight adaptive random-forest for IoT rule generation and execution. J. Inf. Secur. Appl. 34, 218–224 (2017) Domb, M., Bonchek-Dokow, E., Leshem, G.: Lightweight adaptive random-forest for IoT rule generation and execution. J. Inf. Secur. Appl. 34, 218–224 (2017)
8.
Zurück zum Zitat Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2016) Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2016)
9.
Zurück zum Zitat Ibitoye, O., Shafiq, O., Matrawy, A.: Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019) Ibitoye, O., Shafiq, O., Matrawy, A.: Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)
10.
Zurück zum Zitat Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds.) MONAMI 2017. LNICST, vol. 235, pp. 30–44. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-90775-8_3CrossRef Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds.) MONAMI 2017. LNICST, vol. 235, pp. 30–44. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-90775-8_​3CrossRef
11.
Zurück zum Zitat Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)CrossRef Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779–796 (2019)CrossRef
12.
Zurück zum Zitat Kumar, A., Lim, T.J.: Edima: Early detection of IoT malware network activity using machine learning techniques. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289–294. IEEE (2019) Kumar, A., Lim, T.J.: Edima: Early detection of IoT malware network activity using machine learning techniques. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289–294. IEEE (2019)
14.
Zurück zum Zitat Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 5, 18042–18050 (2017)CrossRef Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 5, 18042–18050 (2017)CrossRef
15.
Zurück zum Zitat Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018) Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018)
16.
Zurück zum Zitat Meidan, Y., et al.: N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)CrossRef Meidan, Y., et al.: N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)CrossRef
17.
Zurück zum Zitat Moustafa, N., Turnbull, B., Choo, K.K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet Things J. 6(3), 4815–4830 (2018)CrossRef Moustafa, N., Turnbull, B., Choo, K.K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet Things J. 6(3), 4815–4830 (2018)CrossRef
18.
Zurück zum Zitat Nõmm, S., Bahşi, H.: Unsupervised anomaly based botnet detection in IoT networks. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1048–1053. IEEE (2018) Nõmm, S., Bahşi, H.: Unsupervised anomaly based botnet detection in IoT networks. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1048–1053. IEEE (2018)
19.
Zurück zum Zitat Pajouh, H.H., Javidan, R., Khayami, R., Ali, D., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Topics Comput. 7, 314–323 (2016)CrossRef Pajouh, H.H., Javidan, R., Khayami, R., Ali, D., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Topics Comput. 7, 314–323 (2016)CrossRef
20.
Zurück zum Zitat Shobana, M., Rathi, S.: IoT malware: an analysis of IoT device hijacking (2018) Shobana, M., Rathi, S.: IoT malware: an analysis of IoT device hijacking (2018)
21.
Zurück zum Zitat Timčenko, V., Gajin, S.: Machine learning based network anomaly detection for IoT environments. In: ICIST-2018 Conference (2018) Timčenko, V., Gajin, S.: Machine learning based network anomaly detection for IoT environments. In: ICIST-2018 Conference (2018)
Metadaten
Titel
A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes
verfasst von
M. Shobana
Sugumaran Poonkuzhali
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-76352-7_48