Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection

被引:121
作者
Al Shorman, Amaal [1 ]
Faris, Hossam [1 ]
Aljarah, Ibrahim [1 ]
机构
[1] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
关键词
Internet of Things; Anomaly detection; Botnets; Feature selection; Intrusion detection system; Grey wolf optimization algorithm; Novelty detection; One class support vector machine; GAUSSIAN KERNEL; NETWORK; SELECTION; INTERNET;
D O I
10.1007/s12652-019-01387-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, the number of Internet of Things (IoT) botnet attacks has increased tremendously due to the expansion of online IoT devices which can be easily compromised. Botnets are a common threat that takes advantage of the lack of basic security tools in IoT devices and can perform a series of Distributed Denial of Service (DDoS) attacks. Developing new methods to detect compromised IoT devices is urgent in order to mitigate the negative consequences of these IoT botnets since the existing IoT botnet detection methods still present some issues, such as, relying on labelled data, not being validated with newer botnets, and using very complex machine learning algorithms. Anomaly detection methods are promising for detecting IoT botnet attacks since the amount of available normal data is very large. One of the powerful algorithms that can be used for anomaly detection is One Class Support vector machine (OCSVM). The efficiency of the OCSVM algorithm depends on several factors that greatly affect the classification results such as the subset of features that are used for training OCSVM model, the kernel type, and its hyperparameters. In this paper, a new unsupervised evolutionary IoT botnet detection method is proposed. The main contribution of the proposed method is to detect IoT botnet attacks launched form compromised IoT devices by exploiting the efficiency of a recent swarm intelligence algorithm called Grey Wolf Optimization algorithm (GWO) to optimize the hyperparameters of the OCSVM and at the same time to find the features that best describe the IoT botnet problem. To prove the efficiency of the proposed method, its performance is evaluated using typical anomaly detection evaluation measures over a new version of a real benchmark dataset. The experimental results show that the proposed method outperforms all other algorithms in terms of true positive rate, false positive rate, and G-mean for all IoT device types. Also, it achieves the lowest detection time, while significantly reducing the number of selected features.
引用
收藏
页码:2809 / 2825
页数:17
相关论文
共 44 条
  • [1] Angrishi K., 2017, CoRR
  • [2] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    [J]. COMPUTER, 2017, 50 (02) : 76 - 79
  • [3] Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
    Blenn, Norbert
    Ghiette, Vincent
    Doerr, Christian
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [4] Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach
    Bostani, Hamid
    Sheikhan, Mansour
    [J]. COMPUTER COMMUNICATIONS, 2017, 98 : 52 - 71
  • [5] Butun I, 2015, IEEE INT CONF COMM, P2610, DOI 10.1109/ICCW.2015.7247572
  • [6] Celebucki D, 2018, IEEE ICCE
  • [7] A comparative evaluation of outlier detection algorithms: Experiments and analyses
    Domingues, Remi
    Filippone, Maurizio
    Michiardi, Pietro
    Zouaoui, Jihane
    [J]. PATTERN RECOGNITION, 2018, 74 : 406 - 421
  • [8] Dua D., 2017, UCI MACHINE LEARNING
  • [9] Experienced Gray Wolf Optimization Through Reinforcement Learning and Neural Networks
    Emary, E.
    Zawbaa, Hossam M.
    Grosan, Crina
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (03) : 681 - 694
  • [10] Faris H, 2019, INT J MACH LEARN CYB, V2019, P1, DOI DOI 10.1109/ISGT-LA.2019.8895361