首页> 外文会议>International Conference on Information Security and Cryptology >Detecting IoT Botnet Attacks Using Machine Learning Methods
【24h】

Detecting IoT Botnet Attacks Using Machine Learning Methods

机译:使用机器学习方法检测IOT僵尸网络攻击

获取原文

摘要

Today, with the technological developments, the use of internet connected devices is increasing. It is a fact that life has become easier with the "Internet of Things (IoT), which contributes to the simultaneous operation of these devices with each other. IoT is a technology that designs and does the things people need to do - within a program - and increases the comfort of the user. All the advantages of IoT devices are valid as long as they work correctly and securely. However, when these devices do not work properly and securely or are abused by someone, their advantages as well as disadvantages emerge. The best example of this is the IoT-based Botnet attacks in 2016. Machine learning methods are used to prevent IoT-based attacks and planned attacks. The aim of this study is to detect the normal network traffic and attack traffic with high accuracy by using machine learning methods. The data set used is the N-BaIoT Provision 737E security camera data set, which includes normal network traffic and attack network traffic, and has been used in the literature. Machine learning has been carried out using this data set. The study was carried out in two ways, with and without supervision. EM (Expectation Maximization) algorithm was used while performing unsupervised learning and 76.73% success was achieved. In the application performed with supervised learning, the decision tree (J48) algorithm was used and 99.95% success was achieved. The application was carried out with the Weka 3.8 program.
机译:如今,随着技术的发展,利用互联网连接设备的不断增加。 ,这是一个事实,即生活变得与“物联网(IOT),这有助于相互这些设备的同时操作更加容易物联网是一种技术,设计和做的人需要做的事情 - 在程序中 - 。和增加了用户的舒适性物联网设备的所有优点是有效的,只要它们能够正常,安全地工作。然而,当这些设备不正常,安全地工作或有人受到虐待,他们的优势和劣势显现。这样做的最好的例子是在2016年的机器学习方法基于物联网,僵尸网络攻击主要基于物联网,防止攻击和策划的袭击。本研究的目的是检测正常网络流量和攻击流量与高精度使用机器学习方法。使用的数据集的N BaIoT提供737E安全摄像机的数据集,其包括正常网络通信和攻击的网络流量,并在文献中已被使用。机器学习具有已经进行了使用该数据集。该研究以两种方式进行,并没有监督。使用EM(期望最大化)算法,同时执行监督学习和76.73%,成功达到了。与监督学习执行的应用程序,使用决策树(J48)算法,并达到了99.95%的成功。该应用程序是用了Weka 3.8程序进行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号