Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Botnet Attack Detection Approach in IoT Networks

Authors: T. M. Tatarnikova, I. A. Sikarev, P. Yu. Bogdanov, T. V. Timochkina

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An approach to detecting network attacks based on deep learning (autoencoders) is proposed. It is shown that learning examples can be obtained by connecting IoT devices to the network, as long as the traffic does not carry malicious code. Statistical values and functions extracted from traffic are proposed; patterns of IoT devices are based on them.
Literature
1.
go back to reference Jyothsna, V., Prasad, V.V.R., and Prasad, K.M., A review of anomaly based intrusion detection systems, Int. J. Comput. Appl., 2011, vol. 28, no. 7, pp. 26–35. Jyothsna, V., Prasad, V.V.R., and Prasad, K.M., A review of anomaly based intrusion detection systems, Int. J. Comput. Appl., 2011, vol. 28, no. 7, pp. 26–35.
3.
go back to reference Marochkina, A., Paramonov, A., and Tatarnikova, T.M., Ultra-dense Internet of Things model network, Distributed Computer and Communication Networks. DCCN 2021, Vishnevskiy, V.M., Samouylov, K.E., and Kozyrev, D.V., Eds., Communications in Computer and Information Science, vol. 1552, Cham: Springer, 2022, pp. 111–122.https://doi.org/10.1007/978-3-030-97110-6_8 Marochkina, A., Paramonov, A., and Tatarnikova, T.M., Ultra-dense Internet of Things model network, Distributed Computer and Communication Networks. DCCN 2021, Vishnevskiy, V.M., Samouylov, K.E., and Kozyrev, D.V., Eds., Communications in Computer and Information Science, vol. 1552, Cham: Springer, 2022, pp. 111–122.https://​doi.​org/​10.​1007/​978-3-030-97110-6_​8
4.
go back to reference Petrenko, A.S., Petrenko, S.A., Makoveichuk, K.A., and Chetyrbok, P.V., The IIoT/IoT device control model based on narrow-band IoT (NB-IoT), 2018 IEEE Conf. of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Moscow, 2018, IEEE, 2018, pp. 950–953.https://doi.org/10.1109/EIConRus.2018.8317246 Petrenko, A.S., Petrenko, S.A., Makoveichuk, K.A., and Chetyrbok, P.V., The IIoT/IoT device control model based on narrow-band IoT (NB-IoT), 2018 IEEE Conf. of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Moscow, 2018, IEEE, 2018, pp. 950–953.https://​doi.​org/​10.​1109/​EIConRus.​2018.​8317246
6.
go back to reference Sadek, R.A., Soliman, M.S., and Elsayed, H.S., Effective anomaly intrusion detection system based on neural network with indicator variable and rough set reduction, Int. J. Comput. Sci. Iss., 2013, vol. 10, no. 2, pp. 227–233. Sadek, R.A., Soliman, M.S., and Elsayed, H.S., Effective anomaly intrusion detection system based on neural network with indicator variable and rough set reduction, Int. J. Comput. Sci. Iss., 2013, vol. 10, no. 2, pp. 227–233.
11.
go back to reference Lim, S., Kalinin, M., and Zegzhda, P., Bioinspired intrusion detection in ITC infrastructures, Technological Transformation: A New Role For Human, Machines And Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 10–22.https://doi.org/10.1007/978-3-030-64430-7_2 Lim, S., Kalinin, M., and Zegzhda, P., Bioinspired intrusion detection in ITC infrastructures, Technological Transformation: A New Role For Human, Machines And Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 10–22.https://​doi.​org/​10.​1007/​978-3-030-64430-7_​2
Metadata
Title
Botnet Attack Detection Approach in IoT Networks
Authors
T. M. Tatarnikova
I. A. Sikarev
P. Yu. Bogdanov
T. V. Timochkina
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080259

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue