Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices

A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and whi...

Full description

Bibliographic Details
Main Authors: Erol Gelenbe, Mert Nakip
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9969594/
_version_ 1811186295647502336
author Erol Gelenbe
Mert Nakip
author_facet Erol Gelenbe
Mert Nakip
author_sort Erol Gelenbe
collection DOAJ
description A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and which are easily extracted from network traffic, and trains itself online during normal operation with an Auto-Associative Dense Random Neural Network (AADRNN) using traffic metrics measured as traffic arrives. As it operates, the AADRNN is trained with auto-associative learning only using traffic that it estimates as being benign, without prior collection of different attack data. The experimental evaluation on publicly available Mirai Botnet attack data shows that CDIS achieves high performance with Balanced Accuracy of 97%, despite its low on-line training and execution time. Experimental comparisons show that the AADRNN with sequential (online) auto-associative learning, provides the best performance among six different state-of-the-art machine learning models. Thus CDIS can provide crucial effective information to prevent the spread of Botnet attacks in IoT networks having multiple devices and IP addresses.
first_indexed 2024-04-11T13:44:18Z
format Article
id doaj.art-92e375c0c7da4b65b928a8de391feec4
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-11T13:44:18Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-92e375c0c7da4b65b928a8de391feec42022-12-22T04:21:09ZengIEEEIEEE Access2169-35362022-01-011012653612654910.1109/ACCESS.2022.32267009969594Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT DevicesErol Gelenbe0https://orcid.org/0000-0001-9688-2201Mert Nakip1https://orcid.org/0000-0002-6723-6494Institute of Theoretical and Applied Informatics, Polish Academy of Sciences (PAN), Gliwice, PolandInstitute of Theoretical and Applied Informatics, Polish Academy of Sciences (PAN), Gliwice, PolandA novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and which are easily extracted from network traffic, and trains itself online during normal operation with an Auto-Associative Dense Random Neural Network (AADRNN) using traffic metrics measured as traffic arrives. As it operates, the AADRNN is trained with auto-associative learning only using traffic that it estimates as being benign, without prior collection of different attack data. The experimental evaluation on publicly available Mirai Botnet attack data shows that CDIS achieves high performance with Balanced Accuracy of 97%, despite its low on-line training and execution time. Experimental comparisons show that the AADRNN with sequential (online) auto-associative learning, provides the best performance among six different state-of-the-art machine learning models. Thus CDIS can provide crucial effective information to prevent the spread of Botnet attacks in IoT networks having multiple devices and IP addresses.https://ieeexplore.ieee.org/document/9969594/Internet of Things (IoT)compromised device identificationrandom neural networkauto-associative deep random neural networkbotnetsMirai
spellingShingle Erol Gelenbe
Mert Nakip
Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
IEEE Access
Internet of Things (IoT)
compromised device identification
random neural network
auto-associative deep random neural network
botnets
Mirai
title Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
title_full Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
title_fullStr Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
title_full_unstemmed Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
title_short Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
title_sort traffic based sequential learning during botnet attacks to identify compromised iot devices
topic Internet of Things (IoT)
compromised device identification
random neural network
auto-associative deep random neural network
botnets
Mirai
url https://ieeexplore.ieee.org/document/9969594/
work_keys_str_mv AT erolgelenbe trafficbasedsequentiallearningduringbotnetattackstoidentifycompromisediotdevices
AT mertnakip trafficbasedsequentiallearningduringbotnetattackstoidentifycompromisediotdevices