Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches

被引:21
作者
Asadi, Mehdi [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Khameneh Branch, Khameneh, Iran
关键词
Botnet detection; Internet of Things (IoT); Cooperative game theory; Long short term memory (LSTM); Autoencoder; Support vector machine (SVM); FEATURE-SELECTION; INTERNET; THINGS; DDOS; MECHANISMS; ATTACKS; HYBRID;
D O I
10.1007/s12652-021-03185-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An Internet of Things (IoT) botnet is a collection of infected smart devices that are remotely managed by a botmaster. The injection of multiple attacks into the infrastructure, high permeability, and vulnerability of IoT security interfaces are the most significant challenges in the field of IoT security. Therefore, it is essential to provide an efficient solution that can detect intrusion into the IoT infrastructure in the shortest time. In this paper, cooperative game theory in combination with three approaches-long short term memory (LSTM), Autoencoder, and support vector machine (SVM)-are applied to detect IoT botnet attacks. Proposed approaches based on the selection of effective features using cooperative game theory and shapely value on data set gathered from five IoT devices infected with botnets and using SVM, LSTM, and Autoencoder to identify IoT botnet traffic. Compared to the results of the best method presented on the same data set, the proposed approach improved 11.624% in accuracy, 11.629% in the recall, and 154.41 s in learning time in SVM. Also in LSTM, 0.245% in accuracy, 0.250% in the recall, and 222.72 s improved learning time. In addition, the approach of using Autoencoder has overall good performance and remarkable speed in identifying botnet traffic. Based on the results, the performance of the proposed approach in classifying IoT botnets is very promising. Therefore, it can help IoT providers to identify IoT attacks more accurately and faster so that they may make the proper decisions for detection and prevention of botnet attacks.
引用
收藏
页码:5547 / 5561
页数:15
相关论文
共 57 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
An N, 2017, PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P47, DOI 10.1109/MALWARE.2017.8323956
[3]  
[Anonymous], 2015, ACS SYM SER
[4]  
[Anonymous], 2014, Indian J. Comput. Sci. Eng. (IJCSE)
[5]   Learning Representations for Log Data in Cybersecurity [J].
Arnaldo, Ignacio ;
Cuesta-Infante, Alfredo ;
Arun, Ankit ;
Lam, Mei ;
Bassias, Costas ;
Veeramachaneni, Kalyan .
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 :250-268
[6]   Detecting botnet by using particle swarm optimization algorithm based on voting system [J].
Asadi, Mehdi ;
Jamali, Mohammad Ali Jabraeil ;
Parsa, Saeed ;
Majidnezhad, Vahid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 :95-111
[7]  
Bartlett G, 2007, IMC'07: PROCEEDINGS OF THE 2007 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P57
[8]   Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER COMMUNICATIONS, 2017, 103 :18-28
[9]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[10]   IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices [J].
Bezerra, Vitor Hugo ;
Turrisi da Costa, Victor Guilherme ;
Barbon Junior, Sylvio ;
Miani, Rodrigo Sanches ;
Zarpelao, Bruno Bogaz .
SENSORS, 2019, 19 (14)