Towards a Universal Features Set for IoT Botnet Attacks Detection
- URL: http://arxiv.org/abs/2012.00463v1
- Date: Tue, 1 Dec 2020 13:15:57 GMT
- Title: Towards a Universal Features Set for IoT Botnet Attacks Detection
- Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah,
Abdullah Toqeer, Ahmad Ali
- Abstract summary: We propose a universal features set to better detect the botnet attacks regardless of the underlying dataset.
The proposed features set manifest preeminent results for detecting the botnet attacks when tested the trained machine learning models over three different botnet attack datasets.
- Score: 1.022709144903362
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The security pitfalls of IoT devices make it easy for the attackers to
exploit the IoT devices and make them a part of a botnet. Once hundreds of
thousands of IoT devices are compromised and become the part of a botnet, the
attackers use this botnet to launch the large and complex distributed denial of
service (DDoS) attacks which take down the target websites or services and make
them unable to respond the legitimate users. So far, many botnet detection
techniques have been proposed but their performance is limited to a specific
dataset on which they are trained. This is because the features used to train a
machine learning model on one botnet dataset, do not perform well on other
datasets due to the diversity of attack patterns. Therefore, in this paper, we
propose a universal features set to better detect the botnet attacks regardless
of the underlying dataset. The proposed features set manifest preeminent
results for detecting the botnet attacks when tested the trained machine
learning models over three different botnet attack datasets.
Related papers
- Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems [0.0]
Botnet detection based on machine learning has witnessed significant leaps in recent years.
adversarial attacks on machine learning-based cybersecurity systems are posing a significant threat to these solutions.
In this paper, we introduce a novel attack that utilizes machine learning model's explainability in evading detection by botnet detection systems.
arXiv Detail & Related papers (2023-09-29T18:20:05Z) - MONDEO: Multistage Botnet Detection [2.259031129687683]
MONDEO is a multistage mechanism to detect DNS-based botnet malware.
It comprises four detection stages: Blacklisting/Whitelisting, Query rate analysis, DGA analysis, and Machine learning evaluation.
MONDEO was tested against several datasets to measure its efficiency and performance.
arXiv Detail & Related papers (2023-08-31T09:12:30Z) - NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS
Attack Detection in IoT Domains [0.13999481573773068]
This study proposes NFDLM, a lightweight and optimised Artificial Neural Network (ANN) based Distributed Denial of Services (DDoS) attack detection framework.
Overall, the detection performance achieves approximately 99% accuracy for the detection of attacks from botnets.
arXiv Detail & Related papers (2022-07-15T14:09:08Z) - Membership Inference Attack Using Self Influence Functions [43.10140199124212]
Member inference (MI) attacks aim to determine if a specific data sample was used to train a machine learning model.
We present a novel MI attack for it that employs influence functions, or more specifically the samples' self-influence scores, to perform the MI prediction.
Our attack method achieves new state-of-the-art results for both training with and without data augmentations.
arXiv Detail & Related papers (2022-05-26T23:52:26Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Mobile Botnet Detection: A Deep Learning Approach Using Convolutional
Neural Networks [0.0]
We present a deep learning approach for Android botnet detection based on Convolutional Neural Networks (CNN)
Our proposed botnet detection system is implemented as a CNN-based model that is trained on 342 static app features to distinguish between botnet apps and normal apps.
The trained botnet detection model was evaluated on a set of 6,802 real applications containing 1,929 botnets from the publicly available ISCX botnet dataset.
arXiv Detail & Related papers (2020-07-01T06:19:12Z) - Botnet Detection Using Recurrent Variational Autoencoder [4.486436314247216]
Botnets are increasingly used by malicious actors, creating increasing threat to a large number of internet users.
We propose a novel machine learning based method, named Recurrent Variational Autoencoder (RVAE), for detecting botnets.
Tests show RVAE is able to detect botnets with the same accuracy as the best known results published in literature.
arXiv Detail & Related papers (2020-04-01T05:03:34Z) - Automating Botnet Detection with Graph Neural Networks [106.24877728212546]
Botnets are now a major source for many network attacks, such as DDoS attacks and spam.
In this paper, we consider the neural network design challenges of using modern deep learning techniques to learn policies for botnet detection automatically.
arXiv Detail & Related papers (2020-03-13T15:34:33Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.