Detection of Botnet in the loT Network

Author:

Mumtaz Syeda Lamiya,Syed Hassan Jamil,Al-Ani Ayman,Fatah Salmah,Al-Ani Ahmed K.,Khan Azeem

Abstract

The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and prevention system employing signature and anomaly-based mechanisms. Notably, our methodology extends beyond traditional detection, focusing on proactively impeding bot creation. Leveraging a Linux-based distributed system, Security Information and Event Management (SIEM) tools, and custom rules, our approach encompasses distinct phases Preprocessing, Network Security Monitoring, Rule-based IDS System, and Analysis. Experimental results with diverse PCAP files demonstrate the efficacy of custom rules, significantly enhancing alert counts for various security aspects, including network trojan detection and privacy violations. The significant finding is the substantial increase in alert counts after the integration of custom rules, exemplified in the 1.1 GB PCAP file scenario. Network trojan detection surged from 585 to 988, emphasizing the heightened efficacy of rule-based measures. Privacy breaches and bad traffic alerts also experienced significant increments, showcasing the system’s improved sensitivity and responsiveness. This finding reinforces the pivotal role of custom rules in fortifying IoT network security comprehensively.

Publisher

EDP Sciences

Reference15 articles.

1. Dange S. and Chatterjee M.,“IoT botnet: The largest threat to the IoT network,” in Data Communication and Networks: Proceedings of GUCON 2019, Springer, 2019, pp. 137–157.

2. Lakshmanan R., “Researchers Uncover ‘Pink’ Botnet Malware That Infected Over 1.6 Million Devices.” Accessed: Nov. 14, 2023. [Online]. Available: https://thehackernews.com/2021/11/researchers-uncover-pink-botnet-malware.html

3. ADMIN, “Russian Botnet Attack: Over 1 Million Devices Infected,” Dec. 14, 2021. Accessed: Nov. 14, 2023. [Online]. Available: https://www.stealthlabs.com/news/over-1-million-devices-infected-in-russian-botnet-attack-warns-google/

4. Nguyen H.-T., Ngo Q.-D., and Le V.-H., “A novel graph-based approach for IoT botnet detection,” Int. J. Inf. Secur., vol. 19, no. 5, pp. 567–577, Oct. 2020, doi: 10.1007/s10207-019-00475-6.

5. Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3