Skip to main content

2023 | OriginalPaper | Buchkapitel

AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders

verfasst von : Ashwin Verma, Pronaya Bhattacharya, Vivek Kumar Prasad, Rajan Datt, Sudeep Tanwar

Erschienen in: Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, with the massive exchange of data over Internet of Things (IoT) ecosystems, attacks surfaces have also intensified. In IoT, connected devices share data over open channels and thus are highly vulnerable to security and privacy attacks. Botnet-based attacks have been found to have a significant effect on the network-based system. Thus, in this paper, we present a scheme AutoBots, which differentiates the normal and anomaly behaviour of IoT devices among the connected network. To exploit this, we consider diverse parameters like network behaviour profiles and apply autoencoders to classify and detect anomalous traffic from normal traffic. We used the BASHLITE and MIRAI IoT botnet setup and trained our network with the N-BaIoT dataset that has both benign and malicious network traffic. We compared our scheme for metrics like attack detection time, attack detection with respect to hourly traffic, deep residual accuracy, and residual loss. The presented results signify the efficacy of the proposed scheme against conventional bot-detection schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Verma A, Bhattacharya P, Bodkhe U, Zuhair M, Dewangan RK (2021) Blockchain-based federated cloud environment: Issues and challenges. In: Blockchain for information security and privacy, pp 155–176 Verma A, Bhattacharya P, Bodkhe U, Zuhair M, Dewangan RK (2021) Blockchain-based federated cloud environment: Issues and challenges. In: Blockchain for information security and privacy, pp 155–176
3.
Zurück zum Zitat Shaikh AH, Meshram B (2022) Cloud attacks and defence mechanism for SaaS: a survey. In: Intelligent computing and networking. Springer, pp 43–52 Shaikh AH, Meshram B (2022) Cloud attacks and defence mechanism for SaaS: a survey. In: Intelligent computing and networking. Springer, pp 43–52
4.
Zurück zum Zitat Aqeel S, Shahid Khan A, Ahmad Z, Abdullah J (2022) A comprehensive study on dna based security scheme using deep learning in healthcare. EDPACS 66(3):1–17CrossRef Aqeel S, Shahid Khan A, Ahmad Z, Abdullah J (2022) A comprehensive study on dna based security scheme using deep learning in healthcare. EDPACS 66(3):1–17CrossRef
6.
Zurück zum Zitat Bhattacharya P, Mehta P, Tanwar S, Obaidat MS, Hsiao KF (2020) Heal: a blockchain-envisioned signcryption scheme for healthcare iot ecosystems. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI), Sharjah, United Arab Emirates, pp 1–6. https://doi.org/10.1109/CCCI49893.2020.9256705 Bhattacharya P, Mehta P, Tanwar S, Obaidat MS, Hsiao KF (2020) Heal: a blockchain-envisioned signcryption scheme for healthcare iot ecosystems. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI), Sharjah, United Arab Emirates, pp 1–6. https://​doi.​org/​10.​1109/​CCCI49893.​2020.​9256705
7.
Zurück zum Zitat Verma A, Bhattacharya P, Bodkhe U, Ladha A, Tanwar S (2020) Dams: dynamic association for view materialization based on rule mining scheme. In: The international conference on recent innovations in computing. Springer, pp 529–544 Verma A, Bhattacharya P, Bodkhe U, Ladha A, Tanwar S (2020) Dams: dynamic association for view materialization based on rule mining scheme. In: The international conference on recent innovations in computing. Springer, pp 529–544
8.
Zurück zum Zitat Islam U, Muhammad A, Mansoor R, Hossain MS, Ahmad I, Eldin ET, Khan JA, Rehman AU, Shafiq M (2022) Detection of distributed denial of service (ddos) attacks in iot based monitoring system of banking sector using machine learning models. Sustainability 14(14):8374CrossRef Islam U, Muhammad A, Mansoor R, Hossain MS, Ahmad I, Eldin ET, Khan JA, Rehman AU, Shafiq M (2022) Detection of distributed denial of service (ddos) attacks in iot based monitoring system of banking sector using machine learning models. Sustainability 14(14):8374CrossRef
10.
Zurück zum Zitat Chauhan K, Prasad V (2015) Distributed denial of service (ddos) attack techniques and prevention on cloud environment. Int J Innov Adv Comput Sci 4:210–215 Chauhan K, Prasad V (2015) Distributed denial of service (ddos) attack techniques and prevention on cloud environment. Int J Innov Adv Comput Sci 4:210–215
11.
Zurück zum Zitat Prasad VK, Chudasama V, Mewada A, Bhavsar M, Shah A (2023) Csbrca: cloud security breaches and its root cause analysis. In: Proceedings of third international conference on computing, communications, and cyber-security. Springer, pp 179–192 Prasad VK, Chudasama V, Mewada A, Bhavsar M, Shah A (2023) Csbrca: cloud security breaches and its root cause analysis. In: Proceedings of third international conference on computing, communications, and cyber-security. Springer, pp 179–192
12.
Zurück zum Zitat Prasad VK, Bhavsar M (2017) Efficient resource monitoring and prediction techniques in an iaas level of cloud computing: survey. In: International conference on future internet technologies and trends. Springer, pp 47–55 Prasad VK, Bhavsar M (2017) Efficient resource monitoring and prediction techniques in an iaas level of cloud computing: survey. In: International conference on future internet technologies and trends. Springer, pp 47–55
13.
Zurück zum Zitat Bhattacharya P, Verma A, Sharma G (2022) Blockchain-driven and IoT-assisted chemical supply-chain management. In: Singh PK, Kolekar MH, Tanwar S, Wierzchon ST, Bhatnagar RK (eds) Emerging technologies for computing, communication and smart cities. Springer, Singapore, pp 779–791 Bhattacharya P, Verma A, Sharma G (2022) Blockchain-driven and IoT-assisted chemical supply-chain management. In: Singh PK, Kolekar MH, Tanwar S, Wierzchon ST, Bhatnagar RK (eds) Emerging technologies for computing, communication and smart cities. Springer, Singapore, pp 779–791
14.
Zurück zum Zitat Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI global, pp 911–923 Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI global, pp 911–923
15.
Zurück zum Zitat Bakshi MS, Banker D, Prasad V, Bhavsar M (2022) Smlhadc: security model for load harmonization and anomaly detection in cloud. In: Dahal K, Giri D, Neogy S, Dutta S, Kumar S (eds) Internet of Things and its applications. Springer, Singapore, pp 407–418 Bakshi MS, Banker D, Prasad V, Bhavsar M (2022) Smlhadc: security model for load harmonization and anomaly detection in cloud. In: Dahal K, Giri D, Neogy S, Dutta S, Kumar S (eds) Internet of Things and its applications. Springer, Singapore, pp 407–418
17.
Zurück zum Zitat Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22CrossRef Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22CrossRef
19.
Zurück zum Zitat Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2021) IoT DoS and DDoS attack dataset. IEEE Dataport Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2021) IoT DoS and DDoS attack dataset. IEEE Dataport
20.
Zurück zum Zitat Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: 2017 IEEE international conference on computer and information technology (CIT). IEEE, pp 308–313 Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: 2017 IEEE international conference on computer and information technology (CIT). IEEE, pp 308–313
21.
Zurück zum Zitat Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC). IEEE, pp 1–8 Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC). IEEE, pp 1–8
22.
Zurück zum Zitat Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE international conference on communications (ICC). IEEE, pp 1–6 Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE international conference on communications (ICC). IEEE, pp 1–6
23.
Zurück zum Zitat Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811 Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:​1710.​00811
24.
Zurück zum Zitat Catillo M, Pecchia A, Villano U (2022) Botnet detection in the internet of things through all-in-one deep autoencoding. In: Proceedings of the 17th international conference on availability, reliability and security. ARES’22, association for computing machinery, New York, USA. https://doi.org/10.1145/3538969.3544460 Catillo M, Pecchia A, Villano U (2022) Botnet detection in the internet of things through all-in-one deep autoencoding. In: Proceedings of the 17th international conference on availability, reliability and security. ARES’22, association for computing machinery, New York, USA. https://​doi.​org/​10.​1145/​3538969.​3544460
25.
Zurück zum Zitat Asadi M (2022) Detecting iot botnets based on the combination of cooperative game theory with deep and machine learning approaches. J Ambient Intell Humaniz Comput 13(12):5547–5561CrossRef Asadi M (2022) Detecting iot botnets based on the combination of cooperative game theory with deep and machine learning approaches. J Ambient Intell Humaniz Comput 13(12):5547–5561CrossRef
26.
Zurück zum Zitat Snoussi R, Youssef H (2023) Vae-based latent representations learning for botnet detection in IoT networks. J Netw Syst Manage 31(1):1–24CrossRef Snoussi R, Youssef H (2023) Vae-based latent representations learning for botnet detection in IoT networks. J Netw Syst Manage 31(1):1–24CrossRef
28.
Zurück zum Zitat Tanabe R, Watanabe T, Fujita A, Isawa R, Gañán C, van Eeten M, Yoshioka K, Matsumoto T (2022) Disposable botnets: long-term analysis of IoT botnet infrastructure. J Inf Process 30:577–590 Tanabe R, Watanabe T, Fujita A, Isawa R, Gañán C, van Eeten M, Yoshioka K, Matsumoto T (2022) Disposable botnets: long-term analysis of IoT botnet infrastructure. J Inf Process 30:577–590
29.
Zurück zum Zitat Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110 Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110
30.
Zurück zum Zitat Manoharan S, Sugumaran P, Kumar K (2022) Multichannel based iot malware detection system using system calls and opcode sequences. Int Arab J Inf Technol 19(2):261–271 Manoharan S, Sugumaran P, Kumar K (2022) Multichannel based iot malware detection system using system calls and opcode sequences. Int Arab J Inf Technol 19(2):261–271
31.
Zurück zum Zitat Guang K, Tang G, Wang S, Song H, Bian Y (2016) Using deep learning for detecting Bot cloud. J Commun 37(11):114–128 Guang K, Tang G, Wang S, Song H, Bian Y (2016) Using deep learning for detecting Bot cloud. J Commun 37(11):114–128
32.
Zurück zum Zitat Jung W, Yang H, Zhao M, Sun L, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health Smart Health 15, Article ID 100103 Jung W, Yang H, Zhao M, Sun L, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health Smart Health 15, Article ID 100103
33.
Zurück zum Zitat McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the 2018 international joint conference on neural networks (IJCNN), Rio de Janeiro, Brazil, December 2018 McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the 2018 international joint conference on neural networks (IJCNN), Rio de Janeiro, Brazil, December 2018
34.
Zurück zum Zitat Nguyen HT, Ngo QD, Nguyen DH, Le VH (2020) PSI-rooted subgraph: a novel feature for iot botnet detection using classifier algorithms. ICT Express 42 Nguyen HT, Ngo QD, Nguyen DH, Le VH (2020) PSI-rooted subgraph: a novel feature for iot botnet detection using classifier algorithms. ICT Express 42
35.
Zurück zum Zitat Zhao Y, Xie Y, Yu F, Ke Q, Yu Y, Chen Y, Gillum E (2009) BotGraph: large scale spamming botnet detection, NSDI’09. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, Boston, MA, USA, April 2009 Zhao Y, Xie Y, Yu F, Ke Q, Yu Y, Chen Y, Gillum E (2009) BotGraph: large scale spamming botnet detection, NSDI’09. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, Boston, MA, USA, April 2009
36.
Zurück zum Zitat Zhuang D, Chang JM (2017) PeerHunter: detecting peer-to-peer botnets through community behavior analysis. In: Proceedings of the 2017 IEEE conference on dependable and secure computing, Taipei, China, September 2017, pp 493–500 Zhuang D, Chang JM (2017) PeerHunter: detecting peer-to-peer botnets through community behavior analysis. In: Proceedings of the 2017 IEEE conference on dependable and secure computing, Taipei, China, September 2017, pp 493–500
37.
Zurück zum Zitat Albanese M, Jajodia S, Venkatesan S (2018) Defending from stealthy botnets using moving target defenses. IEEE Secur Priv 16(1):92–97CrossRef Albanese M, Jajodia S, Venkatesan S (2018) Defending from stealthy botnets using moving target defenses. IEEE Secur Priv 16(1):92–97CrossRef
38.
Zurück zum Zitat Spathoulas G, Giachoudis N, Damiris G-P, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11:226CrossRef Spathoulas G, Giachoudis N, Damiris G-P, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11:226CrossRef
Metadaten
Titel
AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders
verfasst von
Ashwin Verma
Pronaya Bhattacharya
Vivek Kumar Prasad
Rajan Datt
Sudeep Tanwar
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-1479-1_64