IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine

被引:6
作者
Hasan, Nasimul
Chen, Zhenxiang [1 ]
Zhao, Chuan
Zhu, Yuhui
Liu, Cong
机构
[1] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
来源
IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) | 2022年
基金
中国国家自然科学基金;
关键词
IoT Botnet; Malware; Botnet; Network Security; Malware Detection; INTERNET;
D O I
10.1109/INFOCOMWKSHPS54753.2022.9798307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT devices have been affected by fundamental security flaws in recent years, rendering them exposed to various threats and viruses, particularly IoT botnets. In contrast to conventional malware on desktop computers and Android, heterogeneous processor architecture constraints on IoT devices pose various challenges to researchers. Traditional methodologies are challenging to apply because of the IoT's unique properties, such as resource-constrained devices, enormous volumes of data, and the requirement of real-time detection. Then it proposes a lightweight framework to detect IoT botnet and botnet families. The framework operates with bot behavior data over a simple yet effective learning based method named Extreme Learning Machine. For IoT botnet detection, the experimental results demonstrate that the suggested technique achieves accuracy, precision, and recall of 97.7%, 97.1%, and 97.1%, respectively. The detection performance of botnet families is inspiring. Furthermore, a comparison of our framework to other current approaches reveals that it produces better results, particularly in terms of the training time, which gives it a considerable edge over other learning-based methods.
引用
收藏
页数:6
相关论文
共 15 条
[1]  
Ahmed Z, 2019, IEEE INT WORKSH COMP, DOI [10.1109/camad.2019.8858484, 10.1109/SCCS.2019.8852596]
[2]   Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection [J].
Al Shorman, Amaal ;
Faris, Hossam ;
Aljarah, Ibrahim .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (07) :2809-2825
[3]  
Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
[4]   MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network [J].
Guerra-Manzanares, Alejandro ;
Medina-Galindo, Jorge ;
Bahsi, Hayretdin ;
Nomm, Sven .
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, :207-218
[5]   A novel graph-based approach for IoT botnet detection [J].
Huy-Trung Nguyen ;
Quoc-Dung Ngo ;
Van-Hoang Le .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (05) :567-577
[6]  
Huy-Trung Nguyen, 2018, 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP). Proceedings, P118, DOI 10.1109/ICICSP.2018.8549713
[7]   N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [J].
Meidan, Yair ;
Bohadana, Michael ;
Mathov, Yael ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Breitenbacher, Dominik ;
Elovici, Yuval .
IEEE PERVASIVE COMPUTING, 2018, 17 (03) :12-22
[8]   SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks [J].
Popoola, Segun I. ;
Adebisi, Bamidele ;
Ande, Ruth ;
Hammoudeh, Mohammad ;
Anoh, Kelvin ;
Atayero, Aderemi A. .
SENSORS, 2021, 21 (09)
[9]   On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild [J].
Pour, Morteza Safaei ;
Mangino, Antonio ;
Friday, Kurt ;
Rathbun, Matthias ;
Bou-Harb, Elias ;
Iqbal, Farkhund ;
Samtani, Sagar ;
Crichigno, Jorge ;
Ghani, Nasir .
COMPUTERS & SECURITY, 2020, 91
[10]  
Routray Sudhir K., 2020, Proceedings of Second International Conference on Inventive Research in Computing Applications (ICIRCA 2020), P923, DOI 10.1109/ICIRCA48905.2020.9182803