Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks

Authors

  • P Ganesh Kumar  Assistant Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • V. Nikhitha  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India
  • P. Mounika  Department of Information Technology, Bhoj Reddy Engineering College for Women, Hyderabad, India

Keywords:

Command and Control Botnet, Peer to Peer Botnet, Network Security, Machine learning, Network Protocols, Cyberattacks, Clustering, Classification, Deep Learning

Abstract

A botnet is a malware that degrades the functionality as well as access to a healthy computer system through malware programs. Botnet programs perform DDoS attack, Spam, phishing attacks. Botnet attack takes place in two ways which are peer to peer attacks and command and control attack. The peer-to-peer attack takes place to by passing botnet attacks from one system to another in a peer-to-peer network while the command-and-control attack takes place by a botmaster attack on a server which uses various transactions in exchange with systems on the network and those nodes in the networks function as slaves. The report presents a survey of various techniques of botnet detection models built using several types of machine learning techniques. The report gives the review on various methodologies involved in Botnet Detection and to identify the best methods involved to understand various dataset. We also surveyed on how classification, clustering is used in detection of Botnet to improve the accuracy of the model.

References

  1. J. A. Cid-Fuentes, C. Szabo, and K. Falkner, ‘‘Adaptive performance anomaly detection in distributed systems using online SVMs,’’ IEEE Trans. Dependable Secure Computer., vol. 17, no. 5, pp. 928–941, Sep./Oct. 2018
  2. F. Hussain et al., "A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks," in IEEE Access, vol. 9, pp. 163412-163430, 2021, doi: 10.1109/ACCESS.2021.3131014.
  3. Y. Zhang, X. Chen, D. Guo, M. Song, Y. Teng, and X. Wang, ‘‘PCCN: Parallel cross convolutional neural network for abnormal network traffic flows detection in multiclass imbalanced network traffic flows,’’ IEEE Access, vol. 7, pp. 119904–119916, 2019.
  4. A. Esfahan and D. L. Bhaskari, ‘‘Intrusion detection using random forests classifier with SMOTE and feature reduction,’’ in Proc. Int. Conf. Cloud Ubiquitous Computer. Emerg. Technol., Nov. 2013, pp. 127–13
  5. T. Trajanovski and N. Zhang, "An Automated and Comprehensive Framework for IoT Botnet Detection and Analysis (IoT-BDA)," in IEEE Access, vol. 9, pp. 124360- 124383, 2021, doi: 10.1109/ACCESS.2021.3110188.
  6. K. Alieyan, A. ALmomani, A. Manasrah, and M. M. Kadhum, ‘‘A survey of botnet detection based on DNS,’’ Neural Comput. Appl., vol. 28, no. 7, pp.1541–1558, Jul. 2017
  7. S. Haq and Y. Singh, "Botnet Detection using Machine Learning," 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2018, pp. 240-245, doi: 10.1109/PDGC.2018.8745912
  8. D. Zhuang and J. M. Chang, ‘‘Enhanced PeerHunter: Detecting peer-to-peer botnets through network-flow level community behaviour analysis,’’ IEEE Trans. Inf. Forensics Security, vol. 14, no. 6, pp. 1485–1500, Jun. 2019
  9. X. D. Hoang, ‘‘Botnet detection based on machine learning techniques using DNS query data,’’ Future Internet, vol. 10, no. 5, pp. 1–11, 2018.
  10. R. Chen, W. Niu, X. Zhang, Z. Zhuo, and F. Lv, ‘‘An effective conversation-based botnet detection method,’’ Math. Problems Eng., vol. 2017, pp. 1–9, Apr. 2017.
  11. D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani, and D. Garant, ‘‘Botnet detection based on traffic behavior analysis and flow intervals,’’ Comput. Secur., vol. 39, pp. 2–16, Nov. 2013.
  12. Z. Bazrafshan, H. Hashemi, S. M. H. Fard, and A. Hamzeh, ‘‘A survey on heuristic malware detection techniques,’’ in Proc. 5th Conf. Inf. Knowl. Technol., May 2013, pp. 113–120.
  13. J. A. Caicedo-Muñoz, A. L. Espino, J. C. Corrales, and A. Rendón, ‘‘QoSclassifier for VPN and non-VPN traffic based on time-related features,’’ Comput.Netw., vol. 144, pp. 271–279, Oct. 2018.
  14. R. Rapuzzi and M. Repetto, ‘‘Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model,’’ Future Gener. Comput. Syst., vol. 85, pp. 235–249, Aug. 2018
  15. P. Sun, J. Li, M. Z. A. Bhuiyan, L. Wang, and B. Li, ‘‘Modeling and clustering attacker activities in IoT through machine learning techniques,’’ Inf. Sci., vol. 479, pp. 456–471, Apr. 2019.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
P Ganesh Kumar, V. Nikhitha, P. Mounika, " Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.689-692, March-April-2023.