Real-Time Malicious Intrusion and Attack Detection in IoT-Enabled Cybersecurity Infrastructures

被引:1
作者
Reddy, Yemireddy Vijaya Simha [1 ]
Yaswanth, Tankasala [1 ]
Yadav, Undralla Purushotham [1 ]
Yedamala, Sai [1 ]
Naresh, M. Venkata [2 ]
机构
[1] Mohan Babu Univ, Erstwhile SreeVidyanikethan Engn Coll, Dept ECE, Tirupati, Andhra Pradesh, India
[2] Mohan Babu Univ, Erstwhile SreeVidyanikethan Engn Coll, Dept ECE, Sch Engn, Tirupati, Andhra Pradesh, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Cyber security; botnet attacks; CNN; Training Accuracy and testing accuracy;
D O I
10.1109/ACCAI61061.2024.10602405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks present's unique challenges in cybersecurity due to their distributed and dynamic nature, making them highly vulnerable to botnet attacks. Existing defense mechanisms often struggle to accurately distinguish between benign and malicious traffic, leading to suboptimal detection accuracy and high false alarm rates. To address this, we propose the Botnet Attack Detection and Defense (BADD) mechanism, a supervised learning-based approach utilizing Convolutional Neural Network (CNN) models. BADD operates by extracting parametric features from traffic data buffered within fixed time frames, enabling predictive analysis to identify potential botnet attacks. We experimented on benchmark datasets with four different CNN models and got encouraging results. The trained models exhibited training accuracies ranging from 0.852 to 0.857 and testing accuracies between 0.825 and 0.862. The effectiveness of our method for detecting harmful intrusions in real-time in cybersecurity infrastructures enabled by the Internet of Things is demonstrated by a comparative analysis with modern methodologies.
引用
收藏
页数:5
相关论文
共 50 条
[21]   A Continuous Learning Approach for Real-Time Network Intrusion Detection [J].
Martina, Marcello Rinaldo ;
Foresti, Gian Luca .
INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2021, 31 (12)
[22]   An Enhanced Real-Time Intrusion Detection Framework Using Federated Transfer Learning in Large-Scale IoT Networks [J].
Harahsheh, Khawlah ;
Alzaqebah, Malek ;
Chen, Chung-Hao .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) :35-42
[23]   Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity [J].
Dini, Pierpaolo ;
Saponara, Sergio .
SENSORS, 2023, 23 (22)
[24]   Deep learning enabled intrusion detection system for Industrial IOT environment [J].
Nandanwar, Himanshu ;
Katarya, Rahul .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
[25]   RADAR: An Automated System for Near Real-Time Detection and Diversion of Malicious Network Traffic [J].
El Jamous, Ziad ;
Soltani, Sohraab ;
Sagduyu, Yalin ;
Li, Jason .
2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
[26]   Designing a hybrid neural network framework for real-time anomaly detection in cybersecurity applications [J].
Aaditya Jain ;
Waleed M. Ead ;
Mohammed Alshahrani ;
Jawaher Suliman Altamimi ;
Fawaz Aklan ;
Shaza Dawood Rihan .
International Journal of Information Technology, 2025, 17 (5) :3173-3179
[27]   Real-time Network Intrusion Detection via Importance Sampled Decision Transformers [J].
Zhou, Hanhan ;
Chen, Jingdi ;
Mei, Yongsheng ;
Adam, Gina ;
Aggarwal, Vaneet ;
Bastian, Nathaniel D. ;
Lan, Tian .
2024 IEEE 21ST INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SMART SYSTEMS, MASS 2024, 2024, :82-91
[28]   Real-Time Cyber Attack Detection Over HoneyPi Using Machine Learning [J].
Alhan, Birkan ;
Gonen, Serkan ;
Karacayilmaz, Gokce ;
Bariskan, Mehmet Ali ;
Yilmaz, Ercan Nurcan .
TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (04) :1394-1401
[29]   Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems [J].
Shahin, Mohammad ;
Maghanaki, Mazdak ;
Hosseinzadeh, Ali ;
Chen, F. Frank .
ADVANCED ENGINEERING INFORMATICS, 2024, 62
[30]   An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity [J].
Deshmukh, Amogh ;
Ravulakollu, Kiran .
TECHNOLOGIES, 2024, 12 (10)