Identification of Botnet Activity in IoT Network Traffic Using Machine Learning
Title | Identification of Botnet Activity in IoT Network Traffic Using Machine Learning |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Hegde, M., Kepnang, G., Mazroei, M. Al, Chavis, J. S., Watkins, L. |
Conference Name | 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA) |
Date Published | November 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-8376-3 |
Keywords | anomaly detection, Botnet, botnet activity, Botnet detection, botnets, CIA attacks, Classification algorithms, composability, computer network security, confidentiality integrity and availability attacks, cybersecurity, Deep Learning, deep-learning classifiers, Internet of Things, invasive software, IoT Botnets, IoT devices, IoT network dataset, IoT network traffic, IoT training datasets, learning (artificial intelligence), machine learning, Measurement, Metrics, Neural networks, performance evaluation, probability, pubcrawl, resilience, Resiliency, Smart homes, supervised machine learning, telecommunication traffic |
Abstract | Today our world benefits from Internet of Things (IoT) technology; however, new security problems arise when these IoT devices are introduced into our homes. Because many of these IoT devices have access to the Internet and they have little to no security, they make our smart homes highly vulnerable to compromise. Some of the threats include IoT botnets and generic confidentiality, integrity, and availability (CIA) attacks. Our research explores botnet detection by experimenting with supervised machine learning and deep-learning classifiers. Further, our approach assesses classifier performance on unbalanced datasets that contain benign data, mixed in with small amounts of malicious data. We demonstrate that the classifiers can separate malicious activity from benign activity within a small IoT network dataset. The classifiers can also separate malicious activity from benign activity in increasingly larger datasets. Our experiments have demonstrated incremental improvement in results for (1) accuracy, (2) probability of detection, and (3) probability of false alarm. The best performance results include 99.9% accuracy, 99.8% probability of detection, and 0% probability of false alarm. This paper also demonstrates how the performance of these classifiers increases, as IoT training datasets become larger and larger. |
URL | https://ieeexplore.ieee.org/document/9264143 |
DOI | 10.1109/IDSTA50958.2020.9264143 |
Citation Key | hegde_identification_2020 |
- performance evaluation
- IoT network dataset
- IoT network traffic
- IoT training datasets
- learning (artificial intelligence)
- machine learning
- Measurement
- Metrics
- Neural networks
- IoT devices
- probability
- pubcrawl
- resilience
- Resiliency
- Smart homes
- supervised machine learning
- telecommunication traffic
- Anomaly Detection
- IoT Botnets
- invasive software
- Internet of Things
- deep-learning classifiers
- deep learning
- Cybersecurity
- confidentiality integrity and availability attacks
- computer network security
- composability
- Classification algorithms
- CIA attacks
- botnets
- Botnet detection
- botnet activity
- botnet