Intelligent botnet detection in IoT networks using parallel CNN-LSTM fusion

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING
Rongrong Jiang, Zhengqiu Weng, Lili Shi, Erxuan Weng, Hongmei Li, Weiqiang Wang, Tiantian Zhu, Wuzhao Li
{"title":"Intelligent botnet detection in IoT networks using parallel CNN-LSTM fusion","authors":"Rongrong Jiang,&nbsp;Zhengqiu Weng,&nbsp;Lili Shi,&nbsp;Erxuan Weng,&nbsp;Hongmei Li,&nbsp;Weiqiang Wang,&nbsp;Tiantian Zhu,&nbsp;Wuzhao Li","doi":"10.1002/cpe.8258","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>With the development of the Internet of Things (IoT), the number of terminal devices is rapidly growing and at the same time, their security is facing serious challenges. For the industrial control system, there are challenges in detecting and preventing botnet. Traditional detection methods focus on capturing and reverse analyzing the botnet programs first and then parsing the extracted features from the malicious code or attacks. However, their accuracy is very low and their latency is relatively high. Moreover, they sometimes even cannot recognize the unknown botnets. The machine learning based detection methods rely on manual feature engineering and have a weak generalization. The deep learning-based methods mostly rely on the system log, which does not take into account the multisource information such as traffic. To address the above issues, from the perspective of the botnet features, this paper proposes an intelligent detection method over parallel CNN-LSTM, integrating the spatial and temporal features to identify botnets. Experimental demonstrate that the accuracy, recall, and <i>F</i>1-score of our proposed method achieve up to over 98%, and the precision, 97.8%, is not the highest but reasonable. It reveals compared with the existing start-of-the-art methods, our proposed method outperforms in the botnet detection. Our methodology's strength lies in its ability to harness the multifaceted information present in IoT traffic, offering a more nuanced and comprehensive analysis. The parallel CNN-LSTM architecture ensures that spatial and temporal data are processed concurrently, preserving the integrity of the information and enabling a more robust detection mechanism. The result is a detection system that not only performs exceptionally well in a controlled environment but also holds promise for real-world application, where the rapid and accurate identification of botnets is paramount.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8258","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

With the development of the Internet of Things (IoT), the number of terminal devices is rapidly growing and at the same time, their security is facing serious challenges. For the industrial control system, there are challenges in detecting and preventing botnet. Traditional detection methods focus on capturing and reverse analyzing the botnet programs first and then parsing the extracted features from the malicious code or attacks. However, their accuracy is very low and their latency is relatively high. Moreover, they sometimes even cannot recognize the unknown botnets. The machine learning based detection methods rely on manual feature engineering and have a weak generalization. The deep learning-based methods mostly rely on the system log, which does not take into account the multisource information such as traffic. To address the above issues, from the perspective of the botnet features, this paper proposes an intelligent detection method over parallel CNN-LSTM, integrating the spatial and temporal features to identify botnets. Experimental demonstrate that the accuracy, recall, and F1-score of our proposed method achieve up to over 98%, and the precision, 97.8%, is not the highest but reasonable. It reveals compared with the existing start-of-the-art methods, our proposed method outperforms in the botnet detection. Our methodology's strength lies in its ability to harness the multifaceted information present in IoT traffic, offering a more nuanced and comprehensive analysis. The parallel CNN-LSTM architecture ensures that spatial and temporal data are processed concurrently, preserving the integrity of the information and enabling a more robust detection mechanism. The result is a detection system that not only performs exceptionally well in a controlled environment but also holds promise for real-world application, where the rapid and accurate identification of botnets is paramount.

利用并行 CNN-LSTM 融合技术智能检测物联网网络中的僵尸网络
摘要随着物联网(IoT)的发展,终端设备的数量迅速增长,与此同时,其安全性也面临着严峻的挑战。对于工业控制系统来说,僵尸网络的检测和防范面临挑战。传统的检测方法主要是先捕获并反向分析僵尸网络程序,然后解析从恶意代码或攻击中提取的特征。然而,这些方法的准确率很低,延迟也相对较高。此外,它们有时甚至无法识别未知的僵尸网络。基于机器学习的检测方法依赖于人工特征工程,泛化能力较弱。基于深度学习的方法大多依赖系统日志,没有考虑流量等多源信息。针对上述问题,本文从僵尸网络特征的角度出发,提出了一种基于并行 CNN-LSTM 的智能检测方法,综合空间和时间特征来识别僵尸网络。实验表明,我们提出的方法的准确率、召回率和 F1 分数都达到了 98% 以上,精度为 97.8%,虽然不是最高的,但也是合理的。实验表明,与现有的先进方法相比,我们提出的方法在僵尸网络检测方面表现出色。我们方法的优势在于能够利用物联网流量中的多方面信息,提供更细致、更全面的分析。并行 CNN-LSTM 架构可确保同时处理空间和时间数据,从而保持信息的完整性,实现更强大的检测机制。因此,该检测系统不仅在受控环境中表现优异,而且有望在现实世界中得到应用,在现实世界中,快速准确地识别僵尸网络至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信