Open Access Open Access  Restricted Access Subscription Access

Identifying Botnet on IoT by Using Supervised Learning Techniques


Affiliations
1 Advanced Informatics School, Level 5, Menara Razak, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia
 

The security challenge on IoT (Internet of Things) is one of the hottest and most pertinent topics at the moment especially the several security challenges. The Botnet is one of the security challenges that most impact for several purposes. The network of private computers infected by malicious software and controlled as a group without the knowledge of owners and each of them running one or more bots is called Botnets. Normally, it is used for sending spam, stealing data, and performing DDoS attacks. One of the techniques that been used for detecting the Botnet is the Supervised Learning method. This study will examine several Supervised Learning methods such as; Linear Regression, Logistic Regression, Decision Tree, Naive Bayes, k- Nearest Neighbors, Random Forest, Gradient Boosting Machines, and Support Vector Machine for identifying the Botnet in IoT with the aim of finding which Supervised Learning technique can achieve the highest accuracy and fastest detection as well as with minimizing the dependent variable.

Keywords

Botnet, DDoS, IoT, Malware, Machine Learning, Supervised Learning.
User
Notifications
Font Size

  • Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Marimuthu Palaniswami, Internet of Things (IoT): A vision, architectural elements, and future directions, ELSEVIER, Future Generation Computer Systems, Volume 29, Issue 7, Pages 1645-1660, Sep 2013.
  • Eleonora Borgia, The Internet of Things vision: Key features, applications and open issues, ELSEVIER, Computer Communications, Volume 54, Pages 1-31, 1 Dec 2014.
  • Luigi Atzori, Antonio Iera, Giacomo Morabito, The Internet of Things: A survey, ELSEVIER, Computer Networks, Volume 54, Issue 15, Pages 2787-2805, 28 Oct 2010.
  • Fernando A.Teixeira, Fernando M.Q.Pereira, Hao-Chi Wong, José M.S.Nogueira, Leonardo B.Oliveira, SIoT: Securing Internet of Things through distributed systems analysis, ELSEVIER, Future Generation Computer Systems, Volume 92, Pages 1172-1186, March 2019.
  • Leon Böck, Emmanouil Vasilomanolakis, Jan Helge Wolf, Max Mühlhäuser, Autonomously detecting sensors in fully distributed botnets, ELSEVIER, Computers & Security, Volume 83, Pages 1-13, June 2019.
  • Daniele Ucci, Leonardo Aniello, Roberto Baldoni, Sur vey of machine lear ning techniques for malware analysis, ELSEVIER, Computers & Security, Volume 81, Pages 123-147, March 2019.
  • Amirhossein Rezaei, Identifying Botnet on IoT and Cloud by Using Machine Learning Techniques, Open International Journal of Informatics (OIJI), 2018.
  • Matias D. Cattaneo, Michael Jansson, Whitney K. Newey (2018). Inference in Linear Regression Models with Many Covariates and Heteroscedasticity. Journal of the American Statistical Association.Volume 113, 2018 Issue 523.
  • Taedong Kim and Stephen J. Wright (2018). PMU Placement for Line Outage Identification via Multinomial Logistic Regression. IEEE Transactions on Smart Grid. Volume. 9 , Issue. 1.
  • Raza Hasan, Sellappan Palaniappan, Abdul Rafiez Abdul Raziff, Salman Mahmood, Kamal Uddin Sar ker (2018). Student Academic Performance Prediction by using Decision Tree Algorithm. 4th International Conference on Computer and Information Sciences (ICCOINS).
  • Tong Li, Jin Li, Zheli Liu, Ping Li, Chunfu Jia (2018). Differentially private Naive Bayes learning over multiple data sources. Elsevier, Information Sciences, Volume 444, May 2018, Pages 89-104.
  • Xueyan Wu, Jiquan Yang, Shuihua Wang (2018). Tea category identification based on optimal wavelet entropy and weighted k-Nearest Neighbors algorithm. Springer Science+Business Media New York.
  • Jaime Lynn Speiser, Bethany J.Wolf, Dongjun Chung, Constantine J.Karvellas, David G.Koch, Valerie L.Durkalski (2019). BiMM forest: A random forest method for modeling clustered and longitudinal binary outcomes. Elsevier, Chemometrics and Intelligent Laboratory Systems, Volume 185, 15 February 2019, Pages 122-134.
  • Xing Chen, Li Huang, Di Xie, Qi Zhao (2018). EGBMMDA: Extreme Gradient Boosting Machine for MiRNA-Disease Association prediction. Cell Death & Diseasevolume 9, Article number: 3 (2018).
  • Jakob Ziegier, Hubert Gattringer, Andreas Mueller (2018). Classification of Gait Phases Based on Bilateral EMG Data Using Support Vector Machines. 2018 7th IEEE International Conference on Biomedical Robotics and Biomechatronics (Biorob).

Abstract Views: 253

PDF Views: 0




  • Identifying Botnet on IoT by Using Supervised Learning Techniques

Abstract Views: 253  |  PDF Views: 0

Authors

Amirhossein Rezaei
Advanced Informatics School, Level 5, Menara Razak, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, 54100 Kuala Lumpur, Malaysia

Abstract


The security challenge on IoT (Internet of Things) is one of the hottest and most pertinent topics at the moment especially the several security challenges. The Botnet is one of the security challenges that most impact for several purposes. The network of private computers infected by malicious software and controlled as a group without the knowledge of owners and each of them running one or more bots is called Botnets. Normally, it is used for sending spam, stealing data, and performing DDoS attacks. One of the techniques that been used for detecting the Botnet is the Supervised Learning method. This study will examine several Supervised Learning methods such as; Linear Regression, Logistic Regression, Decision Tree, Naive Bayes, k- Nearest Neighbors, Random Forest, Gradient Boosting Machines, and Support Vector Machine for identifying the Botnet in IoT with the aim of finding which Supervised Learning technique can achieve the highest accuracy and fastest detection as well as with minimizing the dependent variable.

Keywords


Botnet, DDoS, IoT, Malware, Machine Learning, Supervised Learning.

References