Skip to main content

AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security (CCCS 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 664))

Abstract

Recently, with the massive exchange of data over Internet of Things (IoT) ecosystems, attacks surfaces have also intensified. In IoT, connected devices share data over open channels and thus are highly vulnerable to security and privacy attacks. Botnet-based attacks have been found to have a significant effect on the network-based system. Thus, in this paper, we present a scheme AutoBots, which differentiates the normal and anomaly behaviour of IoT devices among the connected network. To exploit this, we consider diverse parameters like network behaviour profiles and apply autoencoders to classify and detect anomalous traffic from normal traffic. We used the BASHLITE and MIRAI IoT botnet setup and trained our network with the N-BaIoT dataset that has both benign and malicious network traffic. We compared our scheme for metrics like attack detection time, attack detection with respect to hourly traffic, deep residual accuracy, and residual loss. The presented results signify the efficacy of the proposed scheme against conventional bot-detection schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://blog.checkpoint.com/2022/10/26/third-quarter-of-2022-revealsincrease-in-cyberattacks

  2. Verma A, Bhattacharya P, Bodkhe U, Zuhair M, Dewangan RK (2021) Blockchain-based federated cloud environment: Issues and challenges. In: Blockchain for information security and privacy, pp 155–176

    Google Scholar 

  3. Shaikh AH, Meshram B (2022) Cloud attacks and defence mechanism for SaaS: a survey. In: Intelligent computing and networking. Springer, pp 43–52

    Google Scholar 

  4. Aqeel S, Shahid Khan A, Ahmad Z, Abdullah J (2022) A comprehensive study on dna based security scheme using deep learning in healthcare. EDPACS 66(3):1–17

    Article  Google Scholar 

  5. Patel M, Prasad VK, Bhattacharya P, Bhavsar M, Zuhair M (2022) Privacy preservation for big data healthcare management. In: 2022 3rd international conference on intelligent engineering and management (ICIEM), London, United Kingdom, pp 211–216. https://doi.org/10.1109/ICIEM54221.2022.9853038

  6. Bhattacharya P, Mehta P, Tanwar S, Obaidat MS, Hsiao KF (2020) Heal: a blockchain-envisioned signcryption scheme for healthcare iot ecosystems. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI), Sharjah, United Arab Emirates, pp 1–6. https://doi.org/10.1109/CCCI49893.2020.9256705

  7. Verma A, Bhattacharya P, Bodkhe U, Ladha A, Tanwar S (2020) Dams: dynamic association for view materialization based on rule mining scheme. In: The international conference on recent innovations in computing. Springer, pp 529–544

    Google Scholar 

  8. Islam U, Muhammad A, Mansoor R, Hossain MS, Ahmad I, Eldin ET, Khan JA, Rehman AU, Shafiq M (2022) Detection of distributed denial of service (ddos) attacks in iot based monitoring system of banking sector using machine learning models. Sustainability 14(14):8374

    Article  Google Scholar 

  9. Kundu PP, Truong-Huu T, Chen L, Zhou L, Teo SG (2022) Detection and classification of botnet traffic using deep learning with model explanation. IEEE Trans Dependable Secure Comput 1–15. https://doi.org/10.1109/TDSC.2022.3183361

  10. Chauhan K, Prasad V (2015) Distributed denial of service (ddos) attack techniques and prevention on cloud environment. Int J Innov Adv Comput Sci 4:210–215

    Google Scholar 

  11. Prasad VK, Chudasama V, Mewada A, Bhavsar M, Shah A (2023) Csbrca: cloud security breaches and its root cause analysis. In: Proceedings of third international conference on computing, communications, and cyber-security. Springer, pp 179–192

    Google Scholar 

  12. Prasad VK, Bhavsar M (2017) Efficient resource monitoring and prediction techniques in an iaas level of cloud computing: survey. In: International conference on future internet technologies and trends. Springer, pp 47–55

    Google Scholar 

  13. Bhattacharya P, Verma A, Sharma G (2022) Blockchain-driven and IoT-assisted chemical supply-chain management. In: Singh PK, Kolekar MH, Tanwar S, Wierzchon ST, Bhatnagar RK (eds) Emerging technologies for computing, communication and smart cities. Springer, Singapore, pp 779–791

    Google Scholar 

  14. Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI global, pp 911–923

    Google Scholar 

  15. Bakshi MS, Banker D, Prasad V, Bhavsar M (2022) Smlhadc: security model for load harmonization and anomaly detection in cloud. In: Dahal K, Giri D, Neogy S, Dutta S, Kumar S (eds) Internet of Things and its applications. Springer, Singapore, pp 407–418

    Google Scholar 

  16. Min B, Yoo J, Kim S, Shin D, Shin D (2021) Network anomaly detection using memory-augmented deep autoencoder. IEEE Access 9:104695–104706. https://doi.org/10.1109/ACCESS.2021.3100087

    Article  Google Scholar 

  17. Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22

    Article  Google Scholar 

  18. Prasad VK, Dansana D, Mishra BK, Bhavsar M (2022) Intensify cloud security and privacy against phishing attacks. ECS Trans 107(1):1387. https://doi.org/10.1149/10701.1387ecst

  19. Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2021) IoT DoS and DDoS attack dataset. IEEE Dataport

    Google Scholar 

  20. Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: 2017 IEEE international conference on computer and information technology (CIT). IEEE, pp 308–313

    Google Scholar 

  21. Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC). IEEE, pp 1–8

    Google Scholar 

  22. Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE international conference on communications (ICC). IEEE, pp 1–6

    Google Scholar 

  23. Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811

  24. Catillo M, Pecchia A, Villano U (2022) Botnet detection in the internet of things through all-in-one deep autoencoding. In: Proceedings of the 17th international conference on availability, reliability and security. ARES’22, association for computing machinery, New York, USA. https://doi.org/10.1145/3538969.3544460

  25. Asadi M (2022) Detecting iot botnets based on the combination of cooperative game theory with deep and machine learning approaches. J Ambient Intell Humaniz Comput 13(12):5547–5561

    Article  Google Scholar 

  26. Snoussi R, Youssef H (2023) Vae-based latent representations learning for botnet detection in IoT networks. J Netw Syst Manage 31(1):1–24

    Article  Google Scholar 

  27. Regan C, Nasajpour M, Parizi RM, Pouriyeh S, Dehghantanha A, Choo KKR (2022) Federated IoT attack detection using decentralized edge data. Mach Learn Appl 8:100263. https://doi.org/10.1016/j.mlwa.2022.100263. https://www.sciencedirect.com/science/article/pii/S2666827022000081

  28. Tanabe R, Watanabe T, Fujita A, Isawa R, Gañán C, van Eeten M, Yoshioka K, Matsumoto T (2022) Disposable botnets: long-term analysis of IoT botnet infrastructure. J Inf Process 30:577–590

    Google Scholar 

  29. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110

    Google Scholar 

  30. Manoharan S, Sugumaran P, Kumar K (2022) Multichannel based iot malware detection system using system calls and opcode sequences. Int Arab J Inf Technol 19(2):261–271

    Google Scholar 

  31. Guang K, Tang G, Wang S, Song H, Bian Y (2016) Using deep learning for detecting Bot cloud. J Commun 37(11):114–128

    Google Scholar 

  32. Jung W, Yang H, Zhao M, Sun L, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health Smart Health 15, Article ID 100103

    Google Scholar 

  33. McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the 2018 international joint conference on neural networks (IJCNN), Rio de Janeiro, Brazil, December 2018

    Google Scholar 

  34. Nguyen HT, Ngo QD, Nguyen DH, Le VH (2020) PSI-rooted subgraph: a novel feature for iot botnet detection using classifier algorithms. ICT Express 42

    Google Scholar 

  35. Zhao Y, Xie Y, Yu F, Ke Q, Yu Y, Chen Y, Gillum E (2009) BotGraph: large scale spamming botnet detection, NSDI’09. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, Boston, MA, USA, April 2009

    Google Scholar 

  36. Zhuang D, Chang JM (2017) PeerHunter: detecting peer-to-peer botnets through community behavior analysis. In: Proceedings of the 2017 IEEE conference on dependable and secure computing, Taipei, China, September 2017, pp 493–500

    Google Scholar 

  37. Albanese M, Jajodia S, Venkatesan S (2018) Defending from stealthy botnets using moving target defenses. IEEE Secur Priv 16(1):92–97

    Article  Google Scholar 

  38. Spathoulas G, Giachoudis N, Damiris G-P, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11:226

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajan Datt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, A., Bhattacharya, P., Prasad, V.K., Datt, R., Tanwar, S. (2023). AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders. In: Tanwar, S., Wierzchon, S.T., Singh, P.K., Ganzha, M., Epiphaniou, G. (eds) Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security. CCCS 2022. Lecture Notes in Networks and Systems, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-99-1479-1_64

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-1479-1_64

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-1478-4

  • Online ISBN: 978-981-99-1479-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics