Intelligent system for IoT botnet detection using SVM and PSO optimization

M. A. Salam
{"title":"Intelligent system for IoT botnet detection using SVM and PSO optimization","authors":"M. A. Salam","doi":"10.54216/jisiot.030203","DOIUrl":null,"url":null,"abstract":"Botnet attacks involving Internet-of-Things (IoT) devices have skyrocketed in recent years due to the proliferation of internet IoT devices that can be readily infiltrated. The botnet is a common threat, exploiting the absence of basic IoT security technologies and can perform several DDoS attacks. Existing IoT botnet detection methods still have issues, such as relying on labeled data, not being validated with newer botnets, and using very complex machine learning algorithms, making the development of new methods to detect compromised IoT devices urgent to reduce the negative implications of these IoT botnets. Due to the vast amount of normal data accessible, anomaly detection algorithms seem to promise for identifying botnet attacks on the Internet of Things (IoT). For anomaly detection, the One-Class Support vector machine is a strong method (ONE-SVM). Many aspects influence the classification outcomes of the ONE-SVM technique, like that of the subset of features utilized for training the ONE-SVM model, hyperparameters of the kernel. An evolutionary IoT botnet detection algorithm is described in this paper. Particle Swarm Optimization technique (PSO) is used to tune the hyperparameters of the ONE-SVM to detect IoT botnet assaults launched from hacked IoT devices. A new version of a real benchmark dataset is used to evaluate the proposed method's performance using traditional anomaly detection evaluation measures. This technique exceeds all existing algorithms in terms of false positive, true positive and rates, and G-mean for all IoT device categories, according to testing results. It also achieves the shortest detection time despite lowering the number of picked features by a significant amount.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"134 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Intelligent Systems and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54216/jisiot.030203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Botnet attacks involving Internet-of-Things (IoT) devices have skyrocketed in recent years due to the proliferation of internet IoT devices that can be readily infiltrated. The botnet is a common threat, exploiting the absence of basic IoT security technologies and can perform several DDoS attacks. Existing IoT botnet detection methods still have issues, such as relying on labeled data, not being validated with newer botnets, and using very complex machine learning algorithms, making the development of new methods to detect compromised IoT devices urgent to reduce the negative implications of these IoT botnets. Due to the vast amount of normal data accessible, anomaly detection algorithms seem to promise for identifying botnet attacks on the Internet of Things (IoT). For anomaly detection, the One-Class Support vector machine is a strong method (ONE-SVM). Many aspects influence the classification outcomes of the ONE-SVM technique, like that of the subset of features utilized for training the ONE-SVM model, hyperparameters of the kernel. An evolutionary IoT botnet detection algorithm is described in this paper. Particle Swarm Optimization technique (PSO) is used to tune the hyperparameters of the ONE-SVM to detect IoT botnet assaults launched from hacked IoT devices. A new version of a real benchmark dataset is used to evaluate the proposed method's performance using traditional anomaly detection evaluation measures. This technique exceeds all existing algorithms in terms of false positive, true positive and rates, and G-mean for all IoT device categories, according to testing results. It also achieves the shortest detection time despite lowering the number of picked features by a significant amount.
基于支持向量机和粒子群优化的物联网僵尸网络智能检测系统
近年来,由于易于渗透的互联网物联网设备的激增,涉及物联网(IoT)设备的僵尸网络攻击激增。僵尸网络是一种常见的威胁,利用缺乏基本的物联网安全技术,可以执行多次DDoS攻击。现有的物联网僵尸网络检测方法仍然存在问题,例如依赖于标记数据,没有使用新的僵尸网络进行验证,以及使用非常复杂的机器学习算法,因此迫切需要开发新方法来检测受损的物联网设备,以减少这些物联网僵尸网络的负面影响。由于可以访问大量正常数据,异常检测算法似乎有望识别物联网(IoT)上的僵尸网络攻击。对于异常检测,一类支持向量机是一种强方法(ONE-SVM)。许多方面影响着ONE-SVM技术的分类结果,比如用于训练ONE-SVM模型的特征子集、核的超参数。本文描述了一种进化的物联网僵尸网络检测算法。利用粒子群优化技术(PSO)对ONE-SVM的超参数进行调优,检测被入侵物联网设备发起的物联网僵尸网络攻击。利用一个新版本的真实基准数据集,使用传统的异常检测评估度量来评估所提出方法的性能。根据测试结果,该技术在假阳性、真阳性和率以及所有物联网设备类别的g均值方面超过了所有现有算法。它还实现了最短的检测时间,尽管大大降低了所选特征的数量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信