Deep Graph Embedding for IoT Botnet Traffic Detection

Author:

Zhang Bonan1ORCID,Li Jingjin1ORCID,Ward Lindsay2ORCID,Zhang Ying1ORCID,Chen Chao2ORCID,Zhang Jun1ORCID

Affiliation:

1. School of Physics and Electronic Information, Yunnan Normal University, Kunming 650000, China

2. College of Science and Engineering, James Cook University, Townsville QLD 4811, Australia

Abstract

Botnet attacks have mainly targeted computers in the past, which is a fundamental cybersecurity problem. Due to the booming of Internet of things (IoT) devices, an increasing number of botnet attacks are now targeting IoT devices. Researchers have proposed several mechanisms to avoid botnet attacks, such as identification by communication patterns or network topology and defence by DNS blacklisting. A popular direction for botnet detection currently relies on the specific topological characteristics of botnets and uses machine learning models. However, it relies on network experts’ domain knowledge for feature engineering. Recently, neural networks have shown the capability of representation learning. This paper proposes a new approach to extracting graph features via graph neural networks. To capture the particular topology of the botnet, we transform the network traffic into graphs and train a graph neural network to extract features. In our evaluations, we use graph embedding features to train six machine learning models and compare them with the performance of traditional graph features in identifying botnet nodes. The experimental results show that botnet traffic detection is still challenging even with neural networks. We should consider the impact of data, features, and algorithms for an accurate and robust solution.

Funder

National Natural Science Foundation of China

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference44 articles.

1. A survey of botnet and botnet detection;M. Feily

2. Botnets as a vehicle for online crime;N. Ianelli;CERT Coordination Center,2005

3. Know your enemy: tracking botnets;B. Paul;The Honeynet Project & Research Alliance,2005

4. There's a 120,000-Strong IoT DDoS botnet lurking around;C. Cimpanu,2016

5. Mapping the Internet: a hacker's secret Internet Census;S. Christian,2013

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An Internet of Things Security Protection System Architecture;Lecture Notes in Electrical Engineering;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3