Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Intrusion Detection System for IOT Botnet Attacks Using Deep Learning

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The IoT industry is seen intensifying its presence along these recent years. Since IoT devices are small and heterogeneous they can easily fall prey to the cyberattacks. Handling and proper up-gradation of network forensic mechanisms for various security attacks like denial of service, keylogging, man-in-the-middle etc within IoT networks are not easy due to its large size and heterogeneity. Traditional high-end security protection systems are difficult to work in the IoT networks due to the resource constraints and heterogeneous systems within the network. In this paper, we designed an intrusion detection system based on deep learning to uncover IoT DDoS Botnet attacks. The dataset used in this work is designed and developed within a realistic network environment in the Cyber Range Lab of the centre of UNSW Canberra Cyber. The traffic data incorporated includes the combination of normal and attack traffic data. A highly extensible Deep Neural Network (DNN) is developed for IoT networks capable of headstrong detection of the IoT botnet attacks. The evaluation shows that our DNN outperforms the existing systems with high accuracy and precision.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Ashton K. That ‘internet of things’ thing. RFID J. 2009;22(7):97–114.

    Google Scholar 

  2. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721–43.

    Article  Google Scholar 

  3. Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M. Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun. 2017;24(3):10–6.

    Article  Google Scholar 

  4. Lara E, Leocundo A, Mauricio AS, Jesús AG. Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things. Sensors. 2020;20(2):501.

    Article  Google Scholar 

  5. Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE Internet Things J. 2019;6(4):6822–34.

    Article  Google Scholar 

  6. Junia V, Wynn MA, Cardenas AA. Stealing, spying, and abusing: consequences of attacks on internet of things devices. IEEE Secur Priv. 2019;17(5):10–21.

    Article  Google Scholar 

  7. Farnaz D, Ashrafnejad M. The risk of botnets in cyber physical systems. In Security of Cyber-Physical Systems. 2020; 81–106.

  8. Al Shorman A, Faris H, Aljarah I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J Ambient Intell Humaniz Comput. 2020;11(7):2809–25.

    Article  Google Scholar 

  9. Jithin J, Polosky N, Jagannath A, Restuccia F, Melodia T. Machine learning for wireless communications in the Internet of Things: a comprehensive survey. Ad Hoc Netw. 2019;93:101913.

    Article  Google Scholar 

  10. Karimipour H, Dehghantanha A, Parizi RM, Choo KK, Leung H. A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access. 2019;7:80778–88.

    Article  Google Scholar 

  11. Probst P, Boulesteix A-L, Bischl B. Tunability: importance of hyperparameters of machine learning algorithms. J Mach Learn Res. 2019;20(53):1–32.

    MathSciNet  MATH  Google Scholar 

  12. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):20.

    Article  Google Scholar 

  13. Forbes AD. Classification-algorithm evaluation: five performance measures based on confusion matrices. J Clin Monit. 1995;11(3):189–206.

    Article  Google Scholar 

  14. Al-Taleb N, Saqib NA, Dash S. Cyber threat intelligence for secure smart city. arXiv preprint arXiv:2007.13233 (2020).

  15. Bowers AJ, Zhou X. Receiver operating characteristic (ROC) area under the curve (AUC): a diagnostic measure for evaluating the accuracy of predictors of education outcomes. J Educ Stud Placed Risk (JESPAR). 2019;24(1):20–46.

    Article  Google Scholar 

  16. Yu M, Zhuge J, Cao M, Shi Z, Jiang L. A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices. Future Internet. 2020;12(2):27.

    Article  Google Scholar 

  17. Deogirikar J, Vidhate A. Security attacks in IoT: a survey. In: 2017 international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). IEEE; 2017. pp. 32–37.

  18. Bertino E, Islam N. Botnets and internet of things security. Computer. 2017;50(2):76–9.

    Article  Google Scholar 

  19. Anthi E, Williams L, Słowińska M, Theodorakopoulos G, Burnap P. A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 2019;6(5):9042–53.

    Article  Google Scholar 

  20. Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer N O, Guarnizo JD, Elovici Y. Detection of unauthorized IoT devices using machine learning techniques; 2017. arXiv preprint arXiv:1709.04647.

  21. Natarajan J. Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms. In: AI and big data’s potential for disruptive innovation. IGI Global; 2020. pp. 291–316.

  22. Morfino V, Rampone S. Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics. 2020;9(3):444.

    Article  Google Scholar 

  23. Stoian N-A. Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set. Bachelor’s Thesis, University of Twente; 2020.

  24. Doshi R, Apthorpe N, Feamster N. Machine learning ddos detection for consumer internet of things devices. In: IEEE security and privacy workshops (SPW). IEEE. 2018; 2018. pp. 29–35.

  25. Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y. N-baiot network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018;17(3):12–22.

    Article  Google Scholar 

  26. Yuan X, Li C, Li X. DeepDefense: Identifying DDoS attack via deep learning. In: 2017 IEEE international conference on smart computing (SMARTCOMP), Hong Kong; 2017. pp. 1–8. https://doi.org/10.1109/SMARTCOMP.2017.7946998.

  27. Ibitoye O, Shafiq O, Matrawy A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: IEEE global communications conference (GLOBECOM). IEEE. 2019; 2019. pp. 1–6.

  28. Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM international conference on data mining. Society for Industrial and Applied Mathematics; 2003. pp. 25–36.

  29. Qiu P, Xia Z, You L. Process monitoring ROC curve for evaluating dynamic screening methods. Technometrics. 2020;62(2):236–48.

    Article  MathSciNet  Google Scholar 

  30. Koroniotis N, Moustafa N, Sitnikova E, Slay J. Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques. In: International conference on mobile networks and management. Cham, Springer; 2017.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jithu P.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel and Nishtha Kesswani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

P, J., Shareena, J., Ramdas, A. et al. Intrusion Detection System for IOT Botnet Attacks Using Deep Learning. SN COMPUT. SCI. 2, 205 (2021). https://doi.org/10.1007/s42979-021-00516-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00516-9

Keywords

Navigation