H. Esha, Basanagouda S Hadimani, S. P. Devika, P. Shanthala, R. Bhavana
{"title":"IoT Botnet Creation and Detection using Machine Learning","authors":"H. Esha, Basanagouda S Hadimani, S. P. Devika, P. Shanthala, R. Bhavana","doi":"10.1109/InCACCT57535.2023.10141717","DOIUrl":null,"url":null,"abstract":"According to ethical hacking specialists, malware has been present in online environments for a very long time. More malware is being disseminated online as new technology is developed. The prevalence of botnets has increased. Infected software first creates a botnet before spreading the bot throughout a network. A botnet is employed in scenarios with infected massive computers. Ethical hacking instructors issue a warning due to the botnet’s ability to infect vast numbers of computers. Cybersecurity is increasingly relying on botnets. Botnets attack the vast majority of enterprises. To tackle this issue, researchers began to use machine learning (ML).We give a quick review of the various machine learning (ML) techniques used in botnet identification in this study. This paper’s main goal is to undertake various malware analysis to build our botnet, analyze it using a packet-capturing tool, and further validate our machine-learning models utilizing the botnet. To develop reliable and effective real-time online detection and mitigation systems as well as more reliable models, a comprehensive knowledge of these functions is essential.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
According to ethical hacking specialists, malware has been present in online environments for a very long time. More malware is being disseminated online as new technology is developed. The prevalence of botnets has increased. Infected software first creates a botnet before spreading the bot throughout a network. A botnet is employed in scenarios with infected massive computers. Ethical hacking instructors issue a warning due to the botnet’s ability to infect vast numbers of computers. Cybersecurity is increasingly relying on botnets. Botnets attack the vast majority of enterprises. To tackle this issue, researchers began to use machine learning (ML).We give a quick review of the various machine learning (ML) techniques used in botnet identification in this study. This paper’s main goal is to undertake various malware analysis to build our botnet, analyze it using a packet-capturing tool, and further validate our machine-learning models utilizing the botnet. To develop reliable and effective real-time online detection and mitigation systems as well as more reliable models, a comprehensive knowledge of these functions is essential.