A novel botnet attack detection for IoT networks based on communication graphs

被引:6
作者
Munoz, David Concejal [1 ]
Valiente, Antonio del-Corte [2 ]
机构
[1] Inetum Espana SA, C Maria Portugal, 9-11, Bldg 1, Madrid 28050, Spain
[2] Univ Alcala, Polytech Sch, Dept Comp Engn, Barcelona Rd Km 33-6, Madrid 28871, Spain
关键词
Autoencoders; Communication graphs; Cyberattacks; Internet of Things; INTRUSION DETECTION SYSTEM; SECURITY; INTERNET;
D O I
10.1186/s42400-023-00169-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems have been proposed for the detection of botnet attacks. Various types of centralized or distributed cloud-based machine learning and deep learning models have been suggested. However, the emergence of the Internet of Things (IoT) has brought about a huge increase in connected devices, necessitating a different approach. In this paper, we propose to perform detection on IoT-edge devices. The suggested architecture includes an anomaly intrusion detection system in the application layer of IoT-edge devices, arranged in software-defined networks. IoT-edge devices request information from the software-defined networks controller about their own behaviour in the network. This behaviour is represented by communication graphs and is novel for IoT networks. This representation better characterizes the behaviour of the device than the traditional analysis of network traffic, with a lower volume of information. Botnet attack scenarios are simulated with the IoT-23 dataset. Experimental results show that attacks are detected with high accuracy using a deep learning model with low device memory requirements and significant storage reduction for training.
引用
收藏
页数:17
相关论文
共 55 条
[1]   Modelling cyber security for software-defined networks those grow strong when exposed to threats: Analysis and propositions [J].
Ahmed U. ;
Raza I. ;
Hussain S.A. ;
Ali A. ;
Iqbal M. ;
Wang X. .
Journal of Reliable Intelligent Environments, 2015, 1 (2-4) :123-146
[2]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[3]  
[Anonymous], 2012, P 1 INT C SEC INT TH, DOI DOI 10.1145/2490428.2490456
[4]   A Supervised Intrusion Detection System for Smart Home IoT Devices [J].
Anthi, Eirini ;
Williams, Lowri ;
Slowinska, Malgorzata ;
Theodorakopoulos, George ;
Burnap, Pete .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :9042-9053
[5]   SH-IDS: Specification Heuristics Based Intrusion Detection System for IoT Networks [J].
Babu, M. Jagadeesh ;
Reddy, A. Raji .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) :2023-2045
[6]  
Bank D., 2020, arXiv
[7]   Software-defined networking (SDN): a survey [J].
Benzekki, Kamal ;
El Fergougui, Abdeslam ;
Elalaoui, Abdelbaki Elbelrhiti .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5803-5833
[8]   A faster algorithm for betweenness centrality [J].
Brandes, U .
JOURNAL OF MATHEMATICAL SOCIOLOGY, 2001, 25 (02) :163-177
[9]   Centrality estimation in large networks [J].
Brandes, Ulrik ;
Pich, Christian .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (07) :2303-2318
[10]  
Check Point, 2023, Check Point Software's 2023 Cyber Security Report