Using MedBIoT Dataset to Build Effective Machine Learning-Based IoT Botnet Detection Systems

被引:3
作者
Guerra-Manzanares, Alejandro [1 ]
Medina-Galindo, Jorge [1 ]
Bahsi, Hayretdin [1 ]
Nomm, Sven [1 ]
机构
[1] Tallinn Univ Technol, Dept Software Sci, Tallinn, Estonia
来源
INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020 | 2022年 / 1545卷
关键词
Botnet; Internet of Things; Dataset; Intrusion detection; Anomaly detection; IoT; Machine learning; INTRUSION DETECTION SYSTEMS; INTERNET; NETWORK; THINGS; MIRAI;
D O I
10.1007/978-3-030-94900-6_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential increase in the adoption of the Internet of Things (IoT) technology combined with the usual lack of security measures carried by such devices have brought up new risks and security challenges to networks. IoT devices are prone to be easily compromised and used as magnification platforms for record-breaking cyber-attacks (i.e., Distributed Denial-of-Service attacks). Intrusion detection systems based on machine learning aim to detect such threats effectively, overcoming the security limitations on networks. In this regard, data quantity and quality is key to build effective detection models. These data are scarce and limited to small-sized networks for IoT environments. This research addresses this gap generating a labelled behavioral IoT data set, composed of normal and actual botnet network traffic in a medium-sized IoT network (up to 83 devices). Mirai, BashLite and Torii real botnet malware are deployed and data from early stages of botnet deployment is acquired (i.e., infection, propagation and communication with C&C stages). Supervised (i.e. classification) and unsupervised (i.e., anomaly detection) machine learning models are built with the data acquired as a demonstration of the suitability and reliability of the collected data set for effective machine learning-based botnet detection intrusion detection systems (i.e., testing, design and deployment). The IoT behavioral data set is released, being publicly available as MedBIoT data set.
引用
收藏
页码:222 / 243
页数:22
相关论文
共 58 条
[1]  
[Anonymous], 2018, QUICK HIST IOT BOTN
[2]  
[Anonymous], 2019, BASHL IOT MALW UPD M
[3]  
[Anonymous], 2020, SCIKIT LEARN NOVELTY
[4]  
[Anonymous], 2019, Hybrid analysis
[5]  
[Anonymous], 2016, KrebsOnSecurity Hit With Record DDos
[6]  
[Anonymous], 2017, Whats new with the Internet of Things
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]  
Asokan A, 2019, MASSIVE BOTNET ATTAC
[9]  
Bahsi H, 2018, I C CONT AUTOMAT ROB, P1857, DOI 10.1109/ICARCV.2018.8581205
[10]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509