Abstract
Due to the prompt expansion and development of intelligent systems and autonomous, energy-aware sensing devices, the Internet of Things (IoT) has remarkably grown and obstructed nearly all applications in our daily life. However, constraints in computation, storage, and communication capabilities of IoT devices has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for a lightweight and anomaly-based detection system that can build profiles for normal and malicious activities over IoT networks. In this paper, we propose an ensemble learning model for botnet attack detection in IoT networks called ELBA-IoT that profiles behavior features of IoT networks and uses ensemble learning to identify anomalous network traffic from compromised IoT devices. In addition, our IoT-based botnet detection approach characterizes the evaluation of three different machine learning techniques that belong to decision tree techniques (AdaBoosted, RUSBoosted, and bagged). To evaluate ELBA-IoT, we used the N-BaIoT-2021 dataset, which comprises records of both normal IoT network traffic and botnet attack traffic of infected IoT devices. The experimental results demonstrate that our proposed ELBA-IoT can detect the botnet attacks launched from the compromised IoT devices with high detection accuracy (99.6%) and low inference overhead (40 µ-seconds). We also contrast ELBA-IoT results with other state-of-the-art results and demonstrate that ELBA-IoT is superior.
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference45 articles.
1. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses
2. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in Billions)https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
3. The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected Worldhttp://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151022.pdf
4. A Survey: Managing Resource-Constrained Devices in IoT;Dambaye;Int. J. Innov. Res. Comput. Commun. Eng.,2016
5. On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献