Loading…
Detecting IoT Botnets on IoT Edge Devices
Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 378 |
container_issue | |
container_start_page | 373 |
container_title | |
container_volume | |
creator | Raghavendra, Meghana Chen, Zesheng |
description | Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices. |
doi_str_mv | 10.1109/ICCWorkshops53468.2022.9814555 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9814555</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9814555</ieee_id><sourcerecordid>9814555</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-aabe97960eef8e683751af2c3575337a6cda0a970a83bf2b86a2dff3de6082173</originalsourceid><addsrcrecordid>eNotj8tKw0AUQEdBsLb9AjdZCS4S79w7z6WmVQOFbiouyyS5U-MjKZkg-PeCdnU4mwNHiBsJhZTg76qyfB3Gj_Q2HJMmZVyBgFh4J5XW-kxcSWO0QmMlnYsZGq9y9EpeimVK7wBA0jln1EzcrnjiZur6Q1YNu-xhmHqeUjb0f7puD5yt-LtrOC3ERQyfiZcnzsXL43pXPueb7VNV3m_yDoGmPISavfUGmKNj48hqGSI2pK0mssE0bYDgLQRHdcTamYBtjNSyAYfS0lxc_3c7Zt4fx-4rjD_70xn9AkX0RLc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Detecting IoT Botnets on IoT Edge Devices</title><source>IEEE Xplore All Conference Series</source><creator>Raghavendra, Meghana ; Chen, Zesheng</creator><creatorcontrib>Raghavendra, Meghana ; Chen, Zesheng</creatorcontrib><description>Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.</description><identifier>EISSN: 2694-2941</identifier><identifier>EISBN: 1665426713</identifier><identifier>EISBN: 9781665426718</identifier><identifier>DOI: 10.1109/ICCWorkshops53468.2022.9814555</identifier><language>eng</language><publisher>IEEE</publisher><subject>Botnet ; Botnets ; Conferences ; Decision Trees ; Image edge detection ; Input Perturbation Ranking Algorithm ; Intellectual property ; Internet of Things ; Machine learning ; Perturbation methods ; Training</subject><ispartof>2022 IEEE International Conference on Communications Workshops (ICC Workshops), 2022, p.373-378</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9814555$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,23930,23931,25140,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9814555$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Raghavendra, Meghana</creatorcontrib><creatorcontrib>Chen, Zesheng</creatorcontrib><title>Detecting IoT Botnets on IoT Edge Devices</title><title>2022 IEEE International Conference on Communications Workshops (ICC Workshops)</title><addtitle>ICC WORKSHOPS</addtitle><description>Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.</description><subject>Botnet</subject><subject>Botnets</subject><subject>Conferences</subject><subject>Decision Trees</subject><subject>Image edge detection</subject><subject>Input Perturbation Ranking Algorithm</subject><subject>Intellectual property</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Perturbation methods</subject><subject>Training</subject><issn>2694-2941</issn><isbn>1665426713</isbn><isbn>9781665426718</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8tKw0AUQEdBsLb9AjdZCS4S79w7z6WmVQOFbiouyyS5U-MjKZkg-PeCdnU4mwNHiBsJhZTg76qyfB3Gj_Q2HJMmZVyBgFh4J5XW-kxcSWO0QmMlnYsZGq9y9EpeimVK7wBA0jln1EzcrnjiZur6Q1YNu-xhmHqeUjb0f7puD5yt-LtrOC3ERQyfiZcnzsXL43pXPueb7VNV3m_yDoGmPISavfUGmKNj48hqGSI2pK0mssE0bYDgLQRHdcTamYBtjNSyAYfS0lxc_3c7Zt4fx-4rjD_70xn9AkX0RLc</recordid><startdate>20220516</startdate><enddate>20220516</enddate><creator>Raghavendra, Meghana</creator><creator>Chen, Zesheng</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20220516</creationdate><title>Detecting IoT Botnets on IoT Edge Devices</title><author>Raghavendra, Meghana ; Chen, Zesheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-aabe97960eef8e683751af2c3575337a6cda0a970a83bf2b86a2dff3de6082173</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Botnet</topic><topic>Botnets</topic><topic>Conferences</topic><topic>Decision Trees</topic><topic>Image edge detection</topic><topic>Input Perturbation Ranking Algorithm</topic><topic>Intellectual property</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Perturbation methods</topic><topic>Training</topic><toplevel>online_resources</toplevel><creatorcontrib>Raghavendra, Meghana</creatorcontrib><creatorcontrib>Chen, Zesheng</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Raghavendra, Meghana</au><au>Chen, Zesheng</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Detecting IoT Botnets on IoT Edge Devices</atitle><btitle>2022 IEEE International Conference on Communications Workshops (ICC Workshops)</btitle><stitle>ICC WORKSHOPS</stitle><date>2022-05-16</date><risdate>2022</risdate><spage>373</spage><epage>378</epage><pages>373-378</pages><eissn>2694-2941</eissn><eisbn>1665426713</eisbn><eisbn>9781665426718</eisbn><abstract>Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.</abstract><pub>IEEE</pub><doi>10.1109/ICCWorkshops53468.2022.9814555</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2694-2941 |
ispartof | 2022 IEEE International Conference on Communications Workshops (ICC Workshops), 2022, p.373-378 |
issn | 2694-2941 |
language | eng |
recordid | cdi_ieee_primary_9814555 |
source | IEEE Xplore All Conference Series |
subjects | Botnet Botnets Conferences Decision Trees Image edge detection Input Perturbation Ranking Algorithm Intellectual property Internet of Things Machine learning Perturbation methods Training |
title | Detecting IoT Botnets on IoT Edge Devices |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T06%3A00%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Detecting%20IoT%20Botnets%20on%20IoT%20Edge%20Devices&rft.btitle=2022%20IEEE%20International%20Conference%20on%20Communications%20Workshops%20(ICC%20Workshops)&rft.au=Raghavendra,%20Meghana&rft.date=2022-05-16&rft.spage=373&rft.epage=378&rft.pages=373-378&rft.eissn=2694-2941&rft_id=info:doi/10.1109/ICCWorkshops53468.2022.9814555&rft.eisbn=1665426713&rft.eisbn_list=9781665426718&rft_dat=%3Cieee_CHZPO%3E9814555%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-aabe97960eef8e683751af2c3575337a6cda0a970a83bf2b86a2dff3de6082173%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9814555&rfr_iscdi=true |