Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks

被引:0
作者
Alwaisi, Zainab [1 ]
机构
[1] Consiglio Nazl Ric Pisa, Ist Informat & Telemat, Pisa, Italy
关键词
6G security; Mirai botnet; Memory efficiency; Smart devices; Internet of Things (IoT); Anomaly detection; Machine learning; PHYSICAL LAYER SECURITY; 6G;
D O I
10.1016/j.iot.2025.101621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rise of 6G-enabled IoT networks has introduced significant challenges in securing resource-constrained devices against high-memory and energy-intensive cyber threats, such as the Mirai botnet. Due to their computational and memory overhead, existing Intrusion Detection Systems (IDS) and deep learning-based security mechanisms are often impractical for constrained IoT environments. This study proposes a TinyML-based real-time anomaly detection framework to classify and detect four distinct Mirai botnet attack types: Scan, UDP flooding, TCP flooding, and ACK flooding while analysing their impact on IoT device memory consumption and security. To address the trade-off between detection accuracy, memory efficiency, and inference time, Na & iuml;ve Bayes (NB), Random Forest (RF), Support Vector Machine (SVM), and K-Nearest Neighbours (KNN) classifiers optimized for TinyML deployment are implemented and compared. Experimental results demonstrate that KNN achieves detection accuracy above 99%, while maintaining low memory usage, making it the most suitable choice for real-time security in constrained IoT environments. Conversely, NB and RF offer superior inference speed with lower computational overhead, presenting a trade-off between detection latency and resource efficiency. Additionally, analysis reveals that Mirai botnet-induced memory consumption leads to increased fragmentation, excessive RAM usage, and higher energy consumption, highlighting the need for adaptive security mechanisms. This framework provides a lightweight, memory-efficient solution for enhancing security in 6G-enabled IoT ecosystems, with potential applications in smart cities, smart homes, and Industry 4.0. By integrating memory-aware ML models, this work contributes critical insights into developing scalable cybersecurity frameworks to ensure resilience against evolving cyber threats.
引用
收藏
页数:19
相关论文
共 38 条
[1]   A comprehensive node-based botnet detection framework for IoT network [J].
Aldaej, Abdulaziz ;
Ahanger, Tariq Ahamed ;
Atiquzzaman, Mohammed ;
Ullah, Imdad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07) :9261-9281
[2]   Attack-Detection Architectural Framework Based on Anomalous Patterns of System Performance and Resource Utilization-Part II [J].
Aloseel, Abdulmohsan ;
Al-Rubaye, Saba ;
Zolotas, Argyrios ;
Shaw, Carl .
IEEE ACCESS, 2021, 9 :87611-87629
[3]  
Alwaisi Z., 2023, INT C IND NETW INT S, P296
[4]   Securing constrained IoT systems: A lightweight machine learning approach for anomaly detection and prevention [J].
Alwaisi, Zainab ;
Kumar, Tanesh ;
Harjula, Erkki ;
Soderi, Simone .
INTERNET OF THINGS, 2024, 28
[5]  
Alwaisi Z, 2024, Arxiv, DOI arXiv:2410.07810
[6]   Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee [J].
Chen, Xiaoming ;
Lei, Lei .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (04) :637-640
[7]  
Chen XP, 2025, Arxiv, DOI arXiv:2503.13819
[8]   Advancements in TinyML: Applications, Limitations, and Impact on IoT Devices [J].
Elhanashi, Abdussalam ;
Dini, Pierpaolo ;
Saponara, Sergio ;
Zheng, Qinghe .
ELECTRONICS, 2024, 13 (17)
[9]  
Rahman TF, 2021, Arxiv, DOI arXiv:2106.02494
[10]   Enabling Massive IoT Toward 6G: A Comprehensive Survey [J].
Guo, Fengxian ;
Yu, F. Richard ;
Zhang, Heli ;
Li, Xi ;
Ji, Hong ;
Leung, Victor C. M. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15) :11891-11915