首页> 外文期刊>Journal of High Speed Networks >An efficient approach to detect IoT botnet attacks using machine learning
【24h】

An efficient approach to detect IoT botnet attacks using machine learning

机译:使用机器学习检测物联网攻击的有效方法

获取原文
获取原文并翻译 | 示例
       

摘要

The numerous security loopholes in the design and implementation of many IoT devices have rendered them an easy target for botnet attacks. Several approaches to implement behavioral IoT botnet attacks detection have been explored, including machine learning. The main goal of previous studies was to achieve the highest possible accuracy in distinguishing normal from malicious IoT traffic, with minimal regard to the identification of the particular type of attack that is being launched. In this study, we present a machine learning based approach for detecting IoT botnet attacks that not only helps distinguish normal from malicious traffic, but also detects the type of the IoT botnet attack. To achieve this goal, the Bot-IoT dataset, in which instances have main attack and sub-attack categories, was utilized after performing the Synthetic Minority Over-sampling Technique (SMOTE), among other preprocessing techniques. Moreover, multiple classifiers were tested and the results from the best three, namely: J48, Random Forest (RF), and Multilayer Perceptron (MLP) networks were reported. The results showed the superiority of the RF and J48 classifiers compared to the MLP networks and other state-of-the-art solutions. The accuracy of the best binary classifier reported in this study reached 0.999, whereas the best accuracies of main attack and subcategories classifications reached 0.96 and 0.93, respectively. Only few studies address the classification errors in this domain, yet, it was assessed in this study in terms of False Negative (FN) rates. J48 and RF classifiers, here also, outperformed the MLP network classifier, and achieved a maximum micro FN rate for subcategories classification of 0.076.
机译:许多IOT设备的设计和实现中的众多安全漏洞使它们呈现了僵尸网络攻击的简单目标。已经探索了几种实施行为物联网击球攻击检测的方法,包括机器学习。以前研究的主要目标是在识别中,达到最高可能的准确性,以识别正在发布的特定攻击的识别。在这项研究中,我们介绍了一种基于机器学习的方法,用于检测IOT僵尸网络攻击,这不仅有助于与恶意流量区分开,而且还检测到IOT僵尸网络攻击的类型。为了实现这一目标,在执行合成少数群体过采样技术(SMOTE)之后,使用了BOT-IOT数据集,其中在其中具有主要攻击和子攻击类别。此外,报道了多种分类器,并报道了最佳三种的结果,即:J48,随机森林(RF)和多层感知网络(MLP)网络。结果表明,与MLP网络和其他最先进的解决方案相比,RF和J48分类器的优越性。本研究报告的最佳二进制分类器的准确性达到0.999,而主要攻击和子类别分类的最佳精度分别达到0.96%和0.93。只有很少的研究解决了这个领域中的分类错误,但在本研究中,就假阴性(FN)率进行了评估。 J48和RF分类器,这里也表达了MLP网络分类器,并实现了0.076的子类别分类的最大Micro FN速率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号