Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques

View through CrossRef
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed Denial of Service (DDOS) attacks. Mirai gained notoriety for its involvement in large-scale attacks that compromised numerous IoT devices through weak authentication credentials. Similarly, Bashlite, also known as Gafgyt or Lizkebab, targets vulnerable IoT devices by exploiting the Shellshock vulnerability in Linux-based systems. These botnets leverage compromised devices to carry out malicious activities and the propagation of malware. While Machine Learning (ML) based approaches have been proposed to identify botnets, however, detecting both Mirai and Bashlite botnets simultaneously is challenging as their attack characteristics are not very similar. In this study, we apply ML techniques like Logistic Regression, Support Vector Machine and Random Forest to classify the malicious traffic from Mirai and Bashlite botnets. The publicly available NBaIoT dataset is used for the training of algorithms to identify the most informative features to detect botnet traffic targeting IoT devices. The dataset contains traffic data from nine infected devices against five protocols. The employed machine learning algorithms achieved test validation accuracy above 99%, with Random Forest performing the best. Our analysis shows that devices generating combo floods share common characteristics like weight or variance calculated within a certain time window.
Title: Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
Description:
The widespread use of the Internet of Things (IoT) has led to a rise in botnet attacks, with the Mirai botnet being a major source of Distributed Denial of Service (DDOS) attacks.
Mirai gained notoriety for its involvement in large-scale attacks that compromised numerous IoT devices through weak authentication credentials.
Similarly, Bashlite, also known as Gafgyt or Lizkebab, targets vulnerable IoT devices by exploiting the Shellshock vulnerability in Linux-based systems.
These botnets leverage compromised devices to carry out malicious activities and the propagation of malware.
While Machine Learning (ML) based approaches have been proposed to identify botnets, however, detecting both Mirai and Bashlite botnets simultaneously is challenging as their attack characteristics are not very similar.
In this study, we apply ML techniques like Logistic Regression, Support Vector Machine and Random Forest to classify the malicious traffic from Mirai and Bashlite botnets.
The publicly available NBaIoT dataset is used for the training of algorithms to identify the most informative features to detect botnet traffic targeting IoT devices.
The dataset contains traffic data from nine infected devices against five protocols.
The employed machine learning algorithms achieved test validation accuracy above 99%, with Random Forest performing the best.
Our analysis shows that devices generating combo floods share common characteristics like weight or variance calculated within a certain time window.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Understanding Botnets: Architecture, Attacks, and Mitigation Strategies
Botnets represents a significant threat in the cybersecurity landscape. Botnets relies on the set of compromised devices called as bots or zombies which are remotely connected and ...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
Nowadays, botnet has become a threat in the area of cybersecurity, and, worse still, it is difficult to be detected in complex network environments. Thus, traffic analysis is adopt...
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
A STUDY ON ADVANCED BOTNETS DETECTION IN VARIOUS COMPUTING SYSTEMS USING MACHINE LEARNING TECHNIQUES
Due to the rapid growth and use of Emerging technologies such as Artificial Intelligence, Machine Learning and Internet of Things, Information industry became so popular, meanwhile...

Back to Top