Customized convolutional neural network model for IoT botnet attack detection

被引:2
作者
Bojarajulu, Balaganesh [1 ]
Tanwar, Sarvesh [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida 201301, Uttar Pradesh, India
关键词
SMOTE-ENC; Mitigation; CNN; CCNN; IoT; Botnet attacks; ENHANCEMENT;
D O I
10.1007/s11760-024-03248-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things is a disruptive technology that has changed the face of many industries. On the contrary, the unpresidential growth of IoT has also introduced many cybersecurity challenges. An adversary can exploit a zero-day vulnerability in an IoT to create a botnet of things. An IoT botnet is a group of compromised Internet of Things weaponized to launch cyber attacks. Machine learning and other artificial intelligence techniques are being used to combat the wide range of cyberattacks on the Internet of Things. However, in order to overcome challenges such as early diagnosis, real-time monitoring, and adaptability to different threats, these Machine Learning approaches still require significant feature engineering. In order to identify IoT botnet assaults early on, this paper suggests using a customized convolutional neural network (CCNN) model. The four phases of the model are feature extraction, attack detection, mitigation, and pre-processing. The class imbalance has been improved and the input data pre-processed using the Enhanced Synthetic minority oversampling approach. Furthermore, flow-based features, raw attributes, mean, median, standard deviation, improved entropy, mutual information, and other statistical features are retrieved and regarded as part of the feature set. The CCNN model provides the detection or classification output during the attack detection phase, which operates depending on the features derived from the input data. Additionally, a mitigation process based on entropy has been suggested to locate the attacker node, aiding in the removal of the susceptible attacker IoT node from the network. The compromised IoT node is removed through the entropy-based mitigation method, which establishes the entropy formulation based on the node's activity. The suggested model's specificity is 97.09%, compared to the minimal specificity reached by conventional techniques, including CNN (83.58%), RNN (86.17%), RF (60.46%), SVM (78.50%), and DNN (84.12%) and SMIE (88.42%), respectively.
引用
收藏
页码:5477 / 5489
页数:13
相关论文
共 34 条
  • [1] Deep learning-based classification model for botnet attack detection
    Ahmed, Abdulghani Ali
    Jabbar, Waheb A.
    Sadiq, Ali Safaa
    Patel, Hiran
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (7) : 3457 - 3466
  • [2] Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection
    Al Shorman, Amaal
    Faris, Hossam
    Aljarah, Ibrahim
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (07) : 2809 - 2825
  • [3] Botnet Attack Detection in IoT Using Machine Learning
    Alissa, Khalid
    Alyas, Tahir
    Zafar, Kashif
    Abbas, Qaiser
    Tabassum, Nadia
    Sakib, Shadman
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [4] Hybrid deep-learning model to detect botnet attacks over internet of things environments
    Alzahrani, Mohammed Y.
    Bamhdi, Alwi M.
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7721 - 7735
  • [5] Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches
    Asadi, Mehdi
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (12) : 5547 - 5561
  • [6] Detecting botnet by using particle swarm optimization algorithm based on voting system
    Asadi, Mehdi
    Jamali, Mohammad Ali Jabraeil
    Parsa, Saeed
    Majidnezhad, Vahid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 (107): : 95 - 111
  • [7] Beraha M, 2019, Arxiv, DOI arXiv:1907.07384
  • [8] csueastbay.edu, ABOUT US
  • [9] Deng entropy
    Deng, Yong
    [J]. CHAOS SOLITONS & FRACTALS, 2016, 91 : 549 - 553
  • [10] Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
    Gelenbe, Erol
    Nakip, Mert
    [J]. IEEE ACCESS, 2022, 10 : 126536 - 126549