Unknown

Dataset Information

0

Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.


ABSTRACT: With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational resource for robust security mechanisms. Moreover, many existing rule-based detection systems can be circumvented by attackers. In this study, we proposed a machine learning (ML)-based botnet attack detection framework with sequential detection architecture. An efficient feature selection approach is adopted to implement a lightweight detection system with a high performance. The overall detection performance achieves around 99% for the botnet attack detection using three different ML algorithms, including artificial neural network (ANN), J48 decision tree, and Naïve Bayes. The experiment result indicates that the proposed architecture can effectively detect botnet-based attacks, and also can be extended with corresponding sub-engines for new kinds of attacks.

SUBMITTER: Soe YN 

PROVIDER: S-EPMC7472319 | biostudies-literature | 2020 Aug

REPOSITORIES: biostudies-literature

altmetric image

Publications

Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.

Soe Yan Naung YN   Feng Yaokai Y   Santosa Paulus Insap PI   Hartanto Rudy R   Sakurai Kouichi K  

Sensors (Basel, Switzerland) 20200805 16


With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational resource for robust security mechanisms. Moreover, many existing rule-based detection systems can be circumvented by attackers. In this study, we prop  ...[more]

Similar Datasets

| S-EPMC7924422 | biostudies-literature
| S-EPMC10256059 | biostudies-literature
| S-EPMC8372004 | biostudies-literature
| S-EPMC9800080 | biostudies-literature
| S-EPMC8749547 | biostudies-literature
| S-EPMC7749366 | biostudies-literature
2022-09-14 | E-MTAB-11607 | biostudies-arrayexpress
| S-EPMC10803083 | biostudies-literature
| S-EPMC2585161 | biostudies-literature
| S-EPMC8336856 | biostudies-literature