Detecting Botnet Attacks in IoT Environments: An Optimized Machine
Learning Approach
- URL: http://arxiv.org/abs/2012.11325v1
- Date: Wed, 16 Dec 2020 16:39:55 GMT
- Title: Detecting Botnet Attacks in IoT Environments: An Optimized Machine
Learning Approach
- Authors: MohammadNoor Injadat and Abdallah Moubayed and Abdallah Shami
- Abstract summary: Machine learning (ML) has emerged as one potential solution due to the abundance of data generated and available for IoT devices and networks.
This paper proposes an optimized ML-based framework to detect attacks on IoT devices in an effective and efficient manner.
Experimental results show that the proposed optimized framework has a high detection accuracy, precision, recall, and F-score.
- Score: 8.641714871787595
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The increased reliance on the Internet and the corresponding surge in
connectivity demand has led to a significant growth in Internet-of-Things (IoT)
devices. The continued deployment of IoT devices has in turn led to an increase
in network attacks due to the larger number of potential attack surfaces as
illustrated by the recent reports that IoT malware attacks increased by 215.7%
from 10.3 million in 2017 to 32.7 million in 2018. This illustrates the
increased vulnerability and susceptibility of IoT devices and networks.
Therefore, there is a need for proper effective and efficient attack detection
and mitigation techniques in such environments. Machine learning (ML) has
emerged as one potential solution due to the abundance of data generated and
available for IoT devices and networks. Hence, they have significant potential
to be adopted for intrusion detection for IoT environments. To that end, this
paper proposes an optimized ML-based framework consisting of a combination of
Bayesian optimization Gaussian Process (BO-GP) algorithm and decision tree (DT)
classification model to detect attacks on IoT devices in an effective and
efficient manner. The performance of the proposed framework is evaluated using
the Bot-IoT-2018 dataset. Experimental results show that the proposed optimized
framework has a high detection accuracy, precision, recall, and F-score,
highlighting its effectiveness and robustness for the detection of botnet
attacks in IoT environments.
Related papers
- Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems [1.749521391198341]
The integration of Internet of Things (IoT) applications in our daily lives has led to a surge in data traffic, posing significant security challenges.
This paper focuses on improving the effectiveness of ML-based IDS at the edge level by introducing a novel method to find a balanced trade-off between cost and accuracy.
arXiv Detail & Related papers (2024-04-29T21:26:18Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Optimized Ensemble Model Towards Secured Industrial IoT Devices [0.1813006808606333]
This paper proposes a framework based on the combined use of Bayesian Optimization-Gaussian Process (BO-GP) with an ensemble tree-based learning model to improve the performance of intrusion and attack detection in IIoT environments.
The proposed framework's performance is evaluated using the Windows 10 dataset collected by the Cyber Range and IoT labs at University of New South Wales.
arXiv Detail & Related papers (2024-01-10T19:06:39Z) - Effective Intrusion Detection in Highly Imbalanced IoT Networks with
Lightweight S2CGAN-IDS [48.353590166168686]
Internet of Things (IoT) networks contain benign traffic far more than abnormal traffic, with some rare attacks.
Most existing studies have been focused on sacrificing the detection rate of the majority class in order to improve the detection rate of the minority class.
We propose a lightweight framework named S2CGAN-IDS to expand the number of minority categories in both data space and feature space.
arXiv Detail & Related papers (2023-06-06T14:19:23Z) - Harris Hawks Feature Selection in Distributed Machine Learning for
Secure IoT Environments [8.690178186919635]
Internet of Things (IoT) applications can collect and transfer sensitive data.
It is necessary to develop new methods to detect hacked IoT devices.
This paper proposes a Feature Selection (FS) model based on Harris Hawks Optimization (HHO) and Random Weight Network (RWN) to detect IoT botnet attacks.
arXiv Detail & Related papers (2023-02-20T09:38:12Z) - Intrusion Detection using Network Traffic Profiling and Machine Learning
for IoT [2.309914459672557]
A single compromised device can have an impact on the whole network and lead to major security and physical damages.
This paper explores the potential of using network profiling and machine learning to secure IoT against cyber-attacks.
arXiv Detail & Related papers (2021-09-06T15:30:10Z) - RIS-assisted UAV Communications for IoT with Wireless Power Transfer
Using Deep Reinforcement Learning [75.677197535939]
We propose a simultaneous wireless power transfer and information transmission scheme for IoT devices with support from unmanned aerial vehicle (UAV) communications.
In a first phase, IoT devices harvest energy from the UAV through wireless power transfer; and then in a second phase, the UAV collects data from the IoT devices through information transmission.
We formulate a Markov decision process and propose two deep reinforcement learning algorithms to solve the optimization problem of maximizing the total network sum-rate.
arXiv Detail & Related papers (2021-08-05T23:55:44Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Enhancing network forensics with particle swarm and deep learning: The
particle deep framework [4.797216015572358]
The popularity of IoT smart things is rising, due to the automation they provide and its effects on productivity.
It has been proven that IoT devices are vulnerable to both well established and new IoT-specific attack vectors.
In this paper, we propose a new network forensic framework for IoT networks that utilised Particle Deep Framework.
arXiv Detail & Related papers (2020-05-02T06:39:33Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.