Detection of IoT Botnet Cyber Attacks using Machine Learning
Abstract
Since they were first used, systems have faced threats from viruses, worms, and hacking attacks. In 2018, there were more devices online than there were people, and this tendency will continue to grow, with an estimated 80 billion devices online by 2024. It is difficult to secure this equipment and the data that flows between them since IoT botnet attacks (IBA) are becoming more and more common. Potential hackers for data theft and cyberattacks have been enticed by the overwhelming quantity and omnipresent presence. One of the biggest issues with the Internet of Things is security. The main goal of this research project is to develop a workable machine learning algorithm-based model to identify and counteract botnet-based attacks on IoT networks. The suggested model addresses the security concern of the dangers provided by bots. The BoT-IoT dataset was used to train a variety of machine learning techniques, including linear regression, logistic regression, K-Nearest Neighbor (KNN), and SVM models. The performance of the system’s results in an F-measure of: 1) 98.0%, 2) 99.0%, and 3) 99.0%. 4) 99.0%. This demonstrates that the proposed models can automatically separate between network activities is malicious or normal.
Full Text:
PDFReferences
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, “Deep Learning Approach for Intelligent Intrusion Detection System,” IEEE Access, vol. 7, pp. 41525–41550, 2019, doi: 10.1109/ACCESS.2019.2895334.
M. A. Ferrag, L. Maglaras, A. Ahmim, M. Derdour, and H. Janicke, “RDTIDS: Rules and decision tree-based intrusion detection system for internet-of-things networks,” Futur. Internet, vol. 12, no. 3, pp. 1–15, 2020, doi: 10.3390/fi12030044.
M. H. Ali, M. Fadlizolkipi, A. Firdaus, and N. Z. Khidzir, “A hybrid Particle swarm optimization-Extreme Learning Machine approach for Intrusion Detection System,” 2018 IEEE 16th Student Conf. Res. Dev. SCOReD 2018, pp. 2018–2021, 2018, doi: 10.1109/SCORED.2018.8711287.
L. Haripriya and M. A. Jabbar, “Role of Machine Learning in Intrusion Detection System: Review,” Proc. 2nd Int. Conf. Electron. Commun. Aerosp. Technol. ICECA 2018, no. Iceca, pp. 925–929, 2018, doi: 10.1109/ICECA.2018.8474576.
A. Haider, M. A. Khan, A. Rehman, M. Ur Rahman, and H. S. Kim, “A real-time sequential deep extreme learning machine cybersecurity intrusion detection system,” Comput. Mater. Contin., vol. 66, no. 2, pp. 1785–1798, 2020, doi: 10.32604/cmc.2020.013910.
C. Song, T. Ristenpart, and V. Shmatikov, “Machine learning models that remember too much,” Proc. ACM Conf. Comput. Commun. Secur., pp. 587–601, 2017, doi: 10.1145/3133956.3134077.
N. Mehrabi, F. Morstatter, N. Saxena, K. Lerman, and A. Galstyan, “A survey on bias and fairness in machine learning,” arXiv, 2019.
I. Arnaldo, A. Cuesta-Infante, A. Arun, M. Lam, C. Bassias, and K. Veeramachaneni, “Learning representations for log data in cyberse-
curity,” International Conference on Cyber Security Cryptography and Machine Learning, pp. 250–268, 2017.
M. Du, F. Li, G. Zheng, and V. Srikumar, “Deeplog: Anomaly detection and diagnosis from system logs through deep learning,” Proceedings of
the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285–1298, 2017.
B. J. Radford, B. D. Richardson, and S. E. Davis, “Sequence aggregation rules for anomaly detection in computer network traffic,” arXiv preprint arXiv:1805.03735, 2018.
Lambert, Glenn M. II, "Security Analytics: Using Deep Learning to Detect Cyber Attacks" (2017). UNF Graduate Theses and Dissertations. 728. https://digitalcommons.unf.edu/etd/728
M. Stevanovic and J. M. Pedersen, “Detecting bots using multi-level traffic analysis.” IJCSA, vol. 1, no. 1, pp. 182–209, 2016.
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming, “AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning,” 2019 IEEE 9th Annu. Comput. Commun. Work. Conf. CCWC 2019, pp. 305–310, 2019, doi: 10.1109/CCWC.2019.8666450.
Moustafa, N., & Slay, J. “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)”. IEEE military communications and information systems conference (MilCIS) 2015. DOI: 10.1109/MilCIS.2015.7348942
Kanimozhi, V., & Jacob, P. “UNSW-NB15 Dataset Feature Selection and Network Intrusion Detection using Deep Learning”, International Journal of Recent Technology and Engineering (IJRTE), Volume-7 Issue-5S2, pp. 443-446, 2019. .
Kumar, V., Sinha, D., Das, A. K., Pandey, S. C., & Goswami, R. T. “An integrated rule based intrusion detection system: Analysis on UNSW-NB15 data set and the real time online dataset,” Cluster Computing, 23(2), 2020, 1397-1418.
Moustafa, N., & Slay, J. “The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set,” Information Security Journal: A Global Perspective, 25(1-3), 2016, 18-31.
LABORATORY, L. (1998). 1998 DARPA Intrusion Detection Evaluation Dataset. Retrieved from https://www.ll.mit.edu/r-d/datasets/1998-darpa-intrusion-detection-evaluation-dataset
Janarthanan, T., & Zargari, S. “Feature selection in UNSW-NB15 and KDDCUP'99 datasets,” IEEE 26th international symposium on industrial electronics (ISIE), 2017. DOI: 10.1109/ISIE.2017.8001537.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. “A detailed analysis of the KDD CUP 99 data set,” IEEE symposium on computational intelligence for security and defense applications, 2009. DOI: 10.1109/CISDA.2009.5356528.
H. Gharaee and H. Hamid, “A new feature selection IDS based on genetic algorithm and SVM,” 8th International Symposium on Telecommunications (IST), IEEE, Tehran, Iran, 2016. DOI:10.1109/ISTEL.2016.7881798
M. Moukhafi, “Artificial neural network optimized by genetic algorithm for intrusion detection system,” Advanced Intelligent Systems for Sustainable Development Conference, Springer, Berlin, Germany, 2018. DOI: 10.1007/978-3-030-11928-7_35.
B. A. Manjunatha, P. Gogoi, and M. T. Akkalappa, “Data mining based framework for effective intrusion detection using hybrid feature selection approach,” International Journal of Computer Network & Information Security, vol. 11, p. 8, 2019.
Sikha Bagui, Xiaojian Wang, and Subhash Bagui, “Machine Learning Based Intrusion Detection for IoT Botnet,” International Journal of Machine Learning and Computing, Vol. 11, No. 6, pp. 399-406, 2021.
Soulaiman Moualla , Khaldoun Khorzom , and Assef Jafar, “Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset,” Computational Intelligence and Neuroscience, Volume 2021, Article ID 5557577, 13 pages https://doi.org/10.1155/2021/5557577
S. Ali, W. Saad, N. Rajatheva, K. Chang, D. Steinbach, B. Sliwa, C. Wietfeld, K. Mei, H. Shiri, H. J. Zepernick, T. M. C. Chu, I. Ahmad, J. Huusko, J. Suutala, S. Bhadauria, V. Bhatia, R. Mitra, S. Amuru, R. Abbas, B. Shao, M. Capobianco, G. Yu, M. Claes, T. Karvonen, M. Chen, M. Girnyk, and H. Malik, “6G White paper on machine learning in wireless communication networks,” arXiv, pp. 1–29, 2020.
J. Lam and R. Abbas, “Machine learning based anomaly detection for 5G networks,” arXiv, pp. 1–12, 2020.
X. D. Hoang and Q. C. Nguyen, “Botnet detection based on machine learning techniques using DNS query data,” Futur. Internet, vol. 10, p. 43, may 2018.
S. Ray, “A Quick Review of Machine Learning Algorithms,” in Proc. Int. Conf. Mach. Learn. Big Data, Cloud Parallel Comput. Trends, Prespectives Prospect. Com. 2019, pp. 35–39, Institute of Electrical and Electronics Engineers Inc., feb 2019.
G. Shaheamlung, H. Kaur, and M. Kaur, “A Survey on machine learning techniques for the diagnosis of liver disease,” Proc. Int. Conf. Intell. Eng. Manag. ICIEM 2020, pp. 337–341, 2020.
G. Shaheamlung, H. Kaur, and M. Kaur, “A Survey on machine learning techniques for the diagnosis of liver disease,” Proc. Int. Conf. Intell. Eng. Manag. ICIEM 2020, pp. 337–341, 2020.
Veselska Olga , Ziubina Ruslana , Fіnenko Yuriy, Nikodem Joanna, “Big Data Analysis Methods Based on Machine Learning to Ensure Information Security,” 25th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Procedia Computer Science 192 (2021) 2633–2640.
D. W. Hosmer Jr, S. Lemeshow, and R. X. Sturdivant, “Applied Logistic Regression,” Book First edition, John Wiley & Sons, 2013.
H. Hegre, “Logistic regression: Binomial, multinomial and ordinal.” Universitetet i Oslo, pp. 1–35, r 2011. [Online]. Available: https://havardhegre.files.wordpress.com/2014/03/logisticregression2011.pdf.
J. Huang, Y. Wei, J. Yi, and M. Liu, “An improved knn based on class contribution and feature weighting,” Proc. - 10th Int. Conf. Meas. Technol. Mechatronics Autom. ICMTMA 2018, vol. 2018-Janua, pp. 313–316, 2018.
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan1, Ibrahim A. Hameed, Min Xu “A Survey on Machine Learning Techniques for Cyber Security in the Last Decade, IEEE Access” VOLUME 8, pp. 222310-222354, 2020. DOI:10.1109/ACCESS.2020.3041951
J. Ngiam, D. Peng, V. Vasudevan, S. Kornblith, Q. V. Le, and R. Pang, “Domain adaptive transfer learning with specialist models.” arXiv preprint arXiv:1811.07056, 2018.
Liu Z, et al. A method of SVM with normalization in intrusion detection. Procedia Environ Sci. 11:256–62, 2011.
Khammassi, C.; Krichen, S. “A GA-LR wrapper approach for feature selection in network intrusion detection,” Comput. Secur., 70, 255–277, 2017.
Vaca, F.D.; Niyaz, Q. “An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS).” IEEE 17th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 2018. doi: 10.1109/NCA.2018.8548315.
DOI: https://doi.org/10.31449/inf.v47i6.4668
This work is licensed under a Creative Commons Attribution 3.0 License.