Deep Learning for Preventing Botnet Attacks on IoT

被引:0
作者
Al-Jaghoub, J. N. [1 ]
Jibreel, N. M. [1 ]
Maleki, F. [1 ]
Aljohar, J. A. J. [1 ]
Fakhoury, F. N. [1 ]
Satrya, G. B. [1 ]
Zgheib, R. [1 ]
机构
[1] Canadian Univ Dubai, Sch Engn Appl Sci & Technol, Dubai, U Arab Emirates
来源
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, PT I, NEW2AN 2023, RUSMART 2023 | 2024年 / 14542卷
关键词
DoS; N-BaIoT; IoT; Deep learning; Attack; Botnet;
D O I
10.1007/978-3-031-60994-7_4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential rise of botnet attacks has created an urgent demand for effective intrusion detection systems within Internet of Things (IoT) environments. This study endeavors to tackle this issue by proposing a deep learning-based solution. The main goal is to evaluate and compare the performance of various convolutional neural network (CNN) variations to determine the most accurate and efficient algorithm for identifying and mitigating botnet attacks in IoT networks. To ensure the suitability of the datasets for training and evaluation, meticulous preprocessing techniques are employed, such as normalization and feature selection. The initial phase of the research involved an exploration of machine learning and deep learning methods to safeguard IoT devices against botnet attacks. This paper specifically focuses on studying CNN, 1DCNN, and CNN-RNN for their effectiveness in detecting botnet attacks, conducting a comparative analysis to ascertain the most accurate approach. Subsequently, the deep learning models are trained using the preprocessed data in the implementation phase of the project. The evaluation metrics employed encompass accuracy and loss rate, enabling a comprehensive assessment of the models' performance in classifying network traffic flows and detecting botnet attacks.
引用
收藏
页码:37 / 46
页数:10
相关论文
共 18 条
  • [1] Towards the design of real-time autonomous IoT NIDS
    Alhowaide, Alaa
    Alsmadi, Izzat
    Tang, Jian
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (05): : 2489 - 2502
  • [2] Brownlee J, 2018, Machine Learning Mastery
  • [3] Costa J., 2020, Int. J. Eng. Res, V9, P531
  • [4] DDoS attacks and defense mechanisms: classification and state-of-the-art
    Douligeris, C
    Mitrokotsa, A
    [J]. COMPUTER NETWORKS, 2004, 44 (05) : 643 - 666
  • [5] el Naqa I., 2015, ONCOLOGY-BASEL, P3, DOI [DOI 10.1007/978-3-319-18305-3_1, 10.1007/978-3-319-18305-3_1, 978-3-319-18305-3, 10.1007/978-3-319-18305-31, DOI 10.1007/978-3-319-18305-31]
  • [6] Hezam AA., 2021, JOIV INT J INFORM VI, V5, P380, DOI [10.30630/joiv.5.4.733, DOI 10.30630/JOIV.5.4.733]
  • [7] Idrissi I., 2021, IAES INT J ARTIF INT, V10, P110, DOI [DOI 10.11591/IJAI.V10.I1.PP110-120, 10.11591/ijai.v10.i1.pp110-120]
  • [8] Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning
    Kim, Jiyeon
    Shim, Minsun
    Hong, Seungah
    Shin, Yulim
    Choi, Eunjung
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (19): : 1 - 22
  • [9] Deep learning: a branch of machine learning
    Kumar, P. Rajendra
    Manash, E. B. K.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [10] Lange T, 2019, 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), P176, DOI [10.1109/SPIN.2019.8711780, 10.1109/spin.2019.8711780]