Real-Time Malicious Intrusion and Attack Detection in IoT-Enabled Cybersecurity Infrastructures

被引:1
作者
Reddy, Yemireddy Vijaya Simha [1 ]
Yaswanth, Tankasala [1 ]
Yadav, Undralla Purushotham [1 ]
Yedamala, Sai [1 ]
Naresh, M. Venkata [2 ]
机构
[1] Mohan Babu Univ, Erstwhile SreeVidyanikethan Engn Coll, Dept ECE, Tirupati, Andhra Pradesh, India
[2] Mohan Babu Univ, Erstwhile SreeVidyanikethan Engn Coll, Dept ECE, Sch Engn, Tirupati, Andhra Pradesh, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Cyber security; botnet attacks; CNN; Training Accuracy and testing accuracy;
D O I
10.1109/ACCAI61061.2024.10602405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks present's unique challenges in cybersecurity due to their distributed and dynamic nature, making them highly vulnerable to botnet attacks. Existing defense mechanisms often struggle to accurately distinguish between benign and malicious traffic, leading to suboptimal detection accuracy and high false alarm rates. To address this, we propose the Botnet Attack Detection and Defense (BADD) mechanism, a supervised learning-based approach utilizing Convolutional Neural Network (CNN) models. BADD operates by extracting parametric features from traffic data buffered within fixed time frames, enabling predictive analysis to identify potential botnet attacks. We experimented on benchmark datasets with four different CNN models and got encouraging results. The trained models exhibited training accuracies ranging from 0.852 to 0.857 and testing accuracies between 0.825 and 0.862. The effectiveness of our method for detecting harmful intrusions in real-time in cybersecurity infrastructures enabled by the Internet of Things is demonstrated by a comparative analysis with modern methodologies.
引用
收藏
页数:5
相关论文
共 50 条
[31]   Hybrid Optimization Algorithm for Detection of Security Attacks in IoT-Enabled Cyber-Physical Systems [J].
Sagu, Amit ;
Gill, Nasib Singh ;
Gulia, Preeti ;
Priyadarshini, Ishaani ;
Chatterjee, Jyotir Moy .
IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (01) :35-46
[32]   Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset [J].
Aswanandini, R. ;
Deepa, C. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (03) :287-295
[33]   Comparison of Advanced Classification Algorithms Based Intrusion Detection from Real-Time Dataset [J].
R. Aswanandini ;
C. Deepa .
Automatic Control and Computer Sciences, 2023, 57 :287-295
[34]   An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns [J].
Roldan-Gomez, Jose ;
Boubeta-Puig, Juan ;
Carrillo-Mondejar, Javier ;
Gomez, Juan Manuel Castelo ;
del Rincon, Jesus Martinez .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
[35]   CARDIAN: A Context Aware Cybersecurity System for Real Time Diagnostic Intrusion Detection Using a Probabilistic Approach with Bayesian Network [J].
Pascale, Francesco ;
Adinolfi, Ennio Andrea ;
Avagliano, Massimiliano ;
Bellacosa, Elisa ;
Coppola, Simone ;
Santonicola, Emanuele .
2022 6TH INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY, ICSRS, 2022, :424-429
[36]   Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection [J].
Patel, Tanish ;
Jhaveri, Rutvij H. ;
Thakker, Dhavalkumar ;
Verma, Sandeep ;
Ingle, Palash .
40TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2025, :2024-2031
[37]   Towards Real-Time Network Intrusion Detection With Image-Based Sequential Packets Representation [J].
Ghadermazi, Jalal ;
Shah, Ankit ;
Bastian, Nathaniel D. .
IEEE TRANSACTIONS ON BIG DATA, 2025, 11 (01) :157-173
[38]   On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids [J].
Gupta, Kirti ;
Sahoo, Subham ;
Panigrahi, Bijaya Ketan ;
Blaabjerg, Frede ;
Popovski, Petar .
ENERGIES, 2021, 14 (16)
[39]   Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing [J].
Sindayigaya, Jean Marie Vianney .
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2025, 71 (02) :583-589
[40]   AI-powered IoT and UAV systems for real-time detection and prevention of illegal logging [J].
Ramadan, Montaser N. A. ;
Ali, Mohammed A. H. ;
Khoo, Shin Yee ;
Alkhedher, Mohammad .
RESULTS IN ENGINEERING, 2024, 24