Abstract
The IoT industry is seen intensifying its presence along these recent years. Since IoT devices are small and heterogeneous they can easily fall prey to the cyberattacks. Handling and proper up-gradation of network forensic mechanisms for various security attacks like denial of service, keylogging, man-in-the-middle etc within IoT networks are not easy due to its large size and heterogeneity. Traditional high-end security protection systems are difficult to work in the IoT networks due to the resource constraints and heterogeneous systems within the network. In this paper, we designed an intrusion detection system based on deep learning to uncover IoT DDoS Botnet attacks. The dataset used in this work is designed and developed within a realistic network environment in the Cyber Range Lab of the centre of UNSW Canberra Cyber. The traffic data incorporated includes the combination of normal and attack traffic data. A highly extensible Deep Neural Network (DNN) is developed for IoT networks capable of headstrong detection of the IoT botnet attacks. The evaluation shows that our DNN outperforms the existing systems with high accuracy and precision.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ashton K. That ‘internet of things’ thing. RFID J. 2009;22(7):97–114.
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721–43.
Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M. Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun. 2017;24(3):10–6.
Lara E, Leocundo A, Mauricio AS, Jesús AG. Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things. Sensors. 2020;20(2):501.
Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE Internet Things J. 2019;6(4):6822–34.
Junia V, Wynn MA, Cardenas AA. Stealing, spying, and abusing: consequences of attacks on internet of things devices. IEEE Secur Priv. 2019;17(5):10–21.
Farnaz D, Ashrafnejad M. The risk of botnets in cyber physical systems. In Security of Cyber-Physical Systems. 2020; 81–106.
Al Shorman A, Faris H, Aljarah I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J Ambient Intell Humaniz Comput. 2020;11(7):2809–25.
Jithin J, Polosky N, Jagannath A, Restuccia F, Melodia T. Machine learning for wireless communications in the Internet of Things: a comprehensive survey. Ad Hoc Netw. 2019;93:101913.
Karimipour H, Dehghantanha A, Parizi RM, Choo KK, Leung H. A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access. 2019;7:80778–88.
Probst P, Boulesteix A-L, Bischl B. Tunability: importance of hyperparameters of machine learning algorithms. J Mach Learn Res. 2019;20(53):1–32.
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):20.
Forbes AD. Classification-algorithm evaluation: five performance measures based on confusion matrices. J Clin Monit. 1995;11(3):189–206.
Al-Taleb N, Saqib NA, Dash S. Cyber threat intelligence for secure smart city. arXiv preprint arXiv:2007.13233 (2020).
Bowers AJ, Zhou X. Receiver operating characteristic (ROC) area under the curve (AUC): a diagnostic measure for evaluating the accuracy of predictors of education outcomes. J Educ Stud Placed Risk (JESPAR). 2019;24(1):20–46.
Yu M, Zhuge J, Cao M, Shi Z, Jiang L. A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices. Future Internet. 2020;12(2):27.
Deogirikar J, Vidhate A. Security attacks in IoT: a survey. In: 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE; 2017. pp. 32–37.
Bertino E, Islam N. Botnets and internet of things security. Computer. 2017;50(2):76–9.
Anthi E, Williams L, Słowińska M, Theodorakopoulos G, Burnap P. A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 2019;6(5):9042–53.
Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer N O, Guarnizo JD, Elovici Y. Detection of unauthorized IoT devices using machine learning techniques; 2017. arXiv preprint arXiv:1709.04647.
Natarajan J. Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms. In: AI and big data’s potential for disruptive innovation. IGI Global; 2020. pp. 291–316.
Morfino V, Rampone S. Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics. 2020;9(3):444.
Stoian N-A. Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set. Bachelor’s Thesis, University of Twente; 2020.
Doshi R, Apthorpe N, Feamster N. Machine learning ddos detection for consumer internet of things devices. In: IEEE security and privacy workshops (SPW). IEEE. 2018; 2018. pp. 29–35.
Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y. N-baiot network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018;17(3):12–22.
Yuan X, Li C, Li X. DeepDefense: Identifying DDoS attack via deep learning. In: 2017 IEEE international conference on smart computing (SMARTCOMP), Hong Kong; 2017. pp. 1–8. https://doi.org/10.1109/SMARTCOMP.2017.7946998.
Ibitoye O, Shafiq O, Matrawy A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: IEEE global communications conference (GLOBECOM). IEEE. 2019; 2019. pp. 1–6.
Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM international conference on data mining. Society for Industrial and Applied Mathematics; 2003. pp. 25–36.
Qiu P, Xia Z, You L. Process monitoring ROC curve for evaluating dynamic screening methods. Technometrics. 2020;62(2):236–48.
Koroniotis N, Moustafa N, Sitnikova E, Slay J. Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques. In: International conference on mobile networks and management. Cham, Springer; 2017.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.
Rights and permissions
About this article
Cite this article
P, J., Shareena, J., Ramdas, A. et al. Intrusion Detection System for IOT Botnet Attacks Using Deep Learning. SN COMPUT. SCI. 2, 205 (2021). https://doi.org/10.1007/s42979-021-00516-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-021-00516-9