机器学习方法在物联网僵尸网络攻击检测中的性能评估

Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi I. Wedyan, Mamoon Obiedat
{"title":"机器学习方法在物联网僵尸网络攻击检测中的性能评估","authors":"Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi I. Wedyan, Mamoon Obiedat","doi":"10.3991/ijim.v17i19.41379","DOIUrl":null,"url":null,"abstract":"Botnets are today recognized as one of the most advanced vulnerability threats. Botnets control a huge percentage of network traffic and PCs. They have the ability to remotely control PCs (zombie machines) by their creator (BotMaster) via Command and Control (C&C) framework. They are the keys to a variety of Internet attacks such as spams, DDOS, and spreading malwares. This study proposes a number of machine learning techniques for detecting botnet assaults via IoT networks to help researchers in choosing the suitable ML algorithm for their applications. Using the BoT-IoT dataset, six different machine learning methods were evaluated: REPTree, RandomTree, RandomForest, J48, metaBagging, and Naive Bayes. Several measures, including accuracy, TPR, FPR, and many more, have been used to evaluate the algorithms’ performance. The six algorithms were evaluated using three different testing situations. Scenario-1 tested the algorithms utilizing all of the parameters presented in the BoT-IoT dataset, scenario-2 used the IG feature reduction approach, and scenario-3 used extracted features from the attacker’s received packets. The results revealed that the assessed algorithms performed well in all three cases with slight differences.","PeriodicalId":53486,"journal":{"name":"International Journal of Interactive Mobile Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks\",\"authors\":\"Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi I. Wedyan, Mamoon Obiedat\",\"doi\":\"10.3991/ijim.v17i19.41379\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Botnets are today recognized as one of the most advanced vulnerability threats. Botnets control a huge percentage of network traffic and PCs. They have the ability to remotely control PCs (zombie machines) by their creator (BotMaster) via Command and Control (C&C) framework. They are the keys to a variety of Internet attacks such as spams, DDOS, and spreading malwares. This study proposes a number of machine learning techniques for detecting botnet assaults via IoT networks to help researchers in choosing the suitable ML algorithm for their applications. Using the BoT-IoT dataset, six different machine learning methods were evaluated: REPTree, RandomTree, RandomForest, J48, metaBagging, and Naive Bayes. Several measures, including accuracy, TPR, FPR, and many more, have been used to evaluate the algorithms’ performance. The six algorithms were evaluated using three different testing situations. Scenario-1 tested the algorithms utilizing all of the parameters presented in the BoT-IoT dataset, scenario-2 used the IG feature reduction approach, and scenario-3 used extracted features from the attacker’s received packets. The results revealed that the assessed algorithms performed well in all three cases with slight differences.\",\"PeriodicalId\":53486,\"journal\":{\"name\":\"International Journal of Interactive Mobile Technologies\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Interactive Mobile Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3991/ijim.v17i19.41379\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Interactive Mobile Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3991/ijim.v17i19.41379","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

僵尸网络是当今公认的最先进的漏洞威胁之一。僵尸网络控制了很大比例的网络流量和pc。他们有能力远程控制电脑(僵尸机)由他们的创造者(BotMaster)通过命令和控制(C&C)框架。它们是各种互联网攻击(如垃圾邮件、DDOS和传播恶意软件)的关键。本研究提出了许多通过物联网网络检测僵尸网络攻击的机器学习技术,以帮助研究人员为其应用选择合适的机器学习算法。使用BoT-IoT数据集,评估了六种不同的机器学习方法:REPTree, RandomTree, RandomForest, J48, metaBagging和朴素贝叶斯。包括精度、TPR、FPR等在内的几个指标已被用于评估算法的性能。使用三种不同的测试情况对这六种算法进行了评估。场景1利用BoT-IoT数据集中提供的所有参数测试算法,场景2使用IG特征约简方法,场景3使用从攻击者收到的数据包中提取的特征。结果显示,所评估的算法在所有三种情况下都表现良好,略有差异。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks
Botnets are today recognized as one of the most advanced vulnerability threats. Botnets control a huge percentage of network traffic and PCs. They have the ability to remotely control PCs (zombie machines) by their creator (BotMaster) via Command and Control (C&C) framework. They are the keys to a variety of Internet attacks such as spams, DDOS, and spreading malwares. This study proposes a number of machine learning techniques for detecting botnet assaults via IoT networks to help researchers in choosing the suitable ML algorithm for their applications. Using the BoT-IoT dataset, six different machine learning methods were evaluated: REPTree, RandomTree, RandomForest, J48, metaBagging, and Naive Bayes. Several measures, including accuracy, TPR, FPR, and many more, have been used to evaluate the algorithms’ performance. The six algorithms were evaluated using three different testing situations. Scenario-1 tested the algorithms utilizing all of the parameters presented in the BoT-IoT dataset, scenario-2 used the IG feature reduction approach, and scenario-3 used extracted features from the attacker’s received packets. The results revealed that the assessed algorithms performed well in all three cases with slight differences.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Interactive Mobile Technologies
International Journal of Interactive Mobile Technologies Computer Science-Computer Networks and Communications
CiteScore
5.20
自引率
0.00%
发文量
250
审稿时长
8 weeks
期刊介绍: This interdisciplinary journal focuses on the exchange of relevant trends and research results and presents practical experiences gained while developing and testing elements of interactive mobile technologies. It bridges the gap between pure academic research journals and more practical publications. So it covers the full range from research, application development to experience reports and product descriptions. Fields of interest include, but are not limited to: -Future trends in m-technologies- Architectures and infrastructures for ubiquitous mobile systems- Services for mobile networks- Industrial Applications- Mobile Computing- Adaptive and Adaptable environments using mobile devices- Mobile Web and video Conferencing- M-learning applications- M-learning standards- Life-long m-learning- Mobile technology support for educator and student- Remote and virtual laboratories- Mobile measurement technologies- Multimedia and virtual environments- Wireless and Ad-hoc Networks- Smart Agent Technologies- Social Impact of Current and Next-generation Mobile Technologies- Facilitation of Mobile Learning- Cost-effectiveness- Real world experiences- Pilot projects, products and applications
期刊最新文献
What My Friends Are Up To? The Relationship between Social Media Usage and Fear of Missing Out among Undergraduates Revolution in Engineering Education through Android-Based Learning Media for Mobile Learning: Practicality of Mobile Learning Media to Improve Electrical Measuring Skills in the Industrial Age 4.0 Enhancing Tourist Experiences in Crowded Destinations through Mobile Augmented Reality: A Comparative Field Study Data-Driven Insights in Higher Education: Exploring the Synergy of Big Data Analytics and Mobile Applications Effects of Social Media Use on Adolescent Psychological Well-Being: A Systematic Literature Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1