检测物联网边缘设备上的物联网僵尸网络

Meghana Raghavendra, Zesheng Chen
{"title":"检测物联网边缘设备上的物联网僵尸网络","authors":"Meghana Raghavendra, Zesheng Chen","doi":"10.1109/iccworkshops53468.2022.9814555","DOIUrl":null,"url":null,"abstract":"Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detecting IoT Botnets on IoT Edge Devices\",\"authors\":\"Meghana Raghavendra, Zesheng Chen\",\"doi\":\"10.1109/iccworkshops53468.2022.9814555\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.\",\"PeriodicalId\":102261,\"journal\":{\"name\":\"2022 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccworkshops53468.2022.9814555\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccworkshops53468.2022.9814555","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)设备在日常生活中的应用迅速扩大,导致网络犯罪分子的攻击面增加。物联网设备经常被破坏并用于创建僵尸网络。本研究的目标是确定一种机器学习方法,该方法可以在资源受限的物联网边缘设备上运行,以实时准确地检测物联网僵尸网络流量。具体来说,我们采用输入扰动排序(IPR)算法和决策树来实现这一目标。我们研究了受两个僵尸网络(即Mirai和Bashlite)感染的物联网流量的网络快照,并使用IPR和XGBoost来识别区分物联网设备良性和异常流量的九个最重要的特征。我们建议使用决策树,一种有监督的机器学习方法,因为它简单,训练和预测的时间更少,易于转化为安全策略,并且在平衡检测精度和速度方面具有灵活性。在我们的实验中,我们将决策树的性能与基于深度学习的方法(即Kitsune)和其他流行的监督机器学习方法进行了比较。我们表明决策树具有很高的决策性能(例如,准确率超过99.99%),但与Kitsune和大多数其他机器学习方法相比,训练和预测时间要少得多。此外,我们证明了在决策树中使用九个最重要的特征,检测精度相似,但计算能力可以显着降低,使僵尸网络检测适用于物联网边缘设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detecting IoT Botnets on IoT Edge Devices
Rapid expansion in the utilization of Internet of things (IoT) devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices have been frequently compromised and used for the creation of botnets. The goal of this research is to identify a machine learning method that can be run on resource-constrained IoT edge devices to detect IoT botnet traffic accurately in real time. Specifically, we apply both the input perturbation ranking (IPR) algorithm and decision trees to achieve this goal. We study the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, and use IPR with XGBoost to identify nine most important features that distinguish between benign and anomalous traffic for IoT devices. We propose to use decision trees, a supervised machine learning method, because of its simplicity, less time to train and predict, ease to be translated to security policy, and flexibility on balancing detection accuracy and speed. In our experiments, we compare the performance of decision trees with a deep-learning based method, i.e., Kitsune, and other popular supervised machine learning methods. We show that decision trees are with high decision performance (e.g., more than 99.99% accuracy), but with much less training and prediction time than Kitsune and most other machine learning methods. Moreover, we demonstrate that using nine most important features in decision tress, the detection accuracy is similar, but the computation power can be significantly reduced, making botnet detection suitable on IoT edge devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信