Abstract
Recently, with the massive exchange of data over Internet of Things (IoT) ecosystems, attacks surfaces have also intensified. In IoT, connected devices share data over open channels and thus are highly vulnerable to security and privacy attacks. Botnet-based attacks have been found to have a significant effect on the network-based system. Thus, in this paper, we present a scheme AutoBots, which differentiates the normal and anomaly behaviour of IoT devices among the connected network. To exploit this, we consider diverse parameters like network behaviour profiles and apply autoencoders to classify and detect anomalous traffic from normal traffic. We used the BASHLITE and MIRAI IoT botnet setup and trained our network with the N-BaIoT dataset that has both benign and malicious network traffic. We compared our scheme for metrics like attack detection time, attack detection with respect to hourly traffic, deep residual accuracy, and residual loss. The presented results signify the efficacy of the proposed scheme against conventional bot-detection schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://blog.checkpoint.com/2022/10/26/third-quarter-of-2022-revealsincrease-in-cyberattacks
Verma A, Bhattacharya P, Bodkhe U, Zuhair M, Dewangan RK (2021) Blockchain-based federated cloud environment: Issues and challenges. In: Blockchain for information security and privacy, pp 155–176
Shaikh AH, Meshram B (2022) Cloud attacks and defence mechanism for SaaS: a survey. In: Intelligent computing and networking. Springer, pp 43–52
Aqeel S, Shahid Khan A, Ahmad Z, Abdullah J (2022) A comprehensive study on dna based security scheme using deep learning in healthcare. EDPACS 66(3):1–17
Patel M, Prasad VK, Bhattacharya P, Bhavsar M, Zuhair M (2022) Privacy preservation for big data healthcare management. In: 2022 3rd international conference on intelligent engineering and management (ICIEM), London, United Kingdom, pp 211–216. https://doi.org/10.1109/ICIEM54221.2022.9853038
Bhattacharya P, Mehta P, Tanwar S, Obaidat MS, Hsiao KF (2020) Heal: a blockchain-envisioned signcryption scheme for healthcare iot ecosystems. In: 2020 international conference on communications, computing, cybersecurity, and informatics (CCCI), Sharjah, United Arab Emirates, pp 1–6. https://doi.org/10.1109/CCCI49893.2020.9256705
Verma A, Bhattacharya P, Bodkhe U, Ladha A, Tanwar S (2020) Dams: dynamic association for view materialization based on rule mining scheme. In: The international conference on recent innovations in computing. Springer, pp 529–544
Islam U, Muhammad A, Mansoor R, Hossain MS, Ahmad I, Eldin ET, Khan JA, Rehman AU, Shafiq M (2022) Detection of distributed denial of service (ddos) attacks in iot based monitoring system of banking sector using machine learning models. Sustainability 14(14):8374
Kundu PP, Truong-Huu T, Chen L, Zhou L, Teo SG (2022) Detection and classification of botnet traffic using deep learning with model explanation. IEEE Trans Dependable Secure Comput 1–15. https://doi.org/10.1109/TDSC.2022.3183361
Chauhan K, Prasad V (2015) Distributed denial of service (ddos) attack techniques and prevention on cloud environment. Int J Innov Adv Comput Sci 4:210–215
Prasad VK, Chudasama V, Mewada A, Bhavsar M, Shah A (2023) Csbrca: cloud security breaches and its root cause analysis. In: Proceedings of third international conference on computing, communications, and cyber-security. Springer, pp 179–192
Prasad VK, Bhavsar M (2017) Efficient resource monitoring and prediction techniques in an iaas level of cloud computing: survey. In: International conference on future internet technologies and trends. Springer, pp 47–55
Bhattacharya P, Verma A, Sharma G (2022) Blockchain-driven and IoT-assisted chemical supply-chain management. In: Singh PK, Kolekar MH, Tanwar S, Wierzchon ST, Bhatnagar RK (eds) Emerging technologies for computing, communication and smart cities. Springer, Singapore, pp 779–791
Singh R, Singh A, Bhattacharya P (2022) A machine learning approach for anomaly detection to secure smart grid systems. In: Research anthology on smart grid and microgrid development. IGI global, pp 911–923
Bakshi MS, Banker D, Prasad V, Bhavsar M (2022) Smlhadc: security model for load harmonization and anomaly detection in cloud. In: Dahal K, Giri D, Neogy S, Dutta S, Kumar S (eds) Internet of Things and its applications. Springer, Singapore, pp 407–418
Min B, Yoo J, Kim S, Shin D, Shin D (2021) Network anomaly detection using memory-augmented deep autoencoder. IEEE Access 9:104695–104706. https://doi.org/10.1109/ACCESS.2021.3100087
Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12–22
Prasad VK, Dansana D, Mishra BK, Bhavsar M (2022) Intensify cloud security and privacy against phishing attacks. ECS Trans 107(1):1387. https://doi.org/10.1149/10701.1387ecst
Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2021) IoT DoS and DDoS attack dataset. IEEE Dataport
Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: 2017 IEEE international conference on computer and information technology (CIT). IEEE, pp 308–313
Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC). IEEE, pp 1–8
Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE international conference on communications (ICC). IEEE, pp 1–6
Tuor A, Kaplan S, Hutchinson B, Nichols N, Robinson S (2017) Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811
Catillo M, Pecchia A, Villano U (2022) Botnet detection in the internet of things through all-in-one deep autoencoding. In: Proceedings of the 17th international conference on availability, reliability and security. ARES’22, association for computing machinery, New York, USA. https://doi.org/10.1145/3538969.3544460
Asadi M (2022) Detecting iot botnets based on the combination of cooperative game theory with deep and machine learning approaches. J Ambient Intell Humaniz Comput 13(12):5547–5561
Snoussi R, Youssef H (2023) Vae-based latent representations learning for botnet detection in IoT networks. J Netw Syst Manage 31(1):1–24
Regan C, Nasajpour M, Parizi RM, Pouriyeh S, Dehghantanha A, Choo KKR (2022) Federated IoT attack detection using decentralized edge data. Mach Learn Appl 8:100263. https://doi.org/10.1016/j.mlwa.2022.100263. https://www.sciencedirect.com/science/article/pii/S2666827022000081
Tanabe R, Watanabe T, Fujita A, Isawa R, Gañán C, van Eeten M, Yoshioka K, Matsumoto T (2022) Disposable botnets: long-term analysis of IoT botnet infrastructure. J Inf Process 30:577–590
Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110
Manoharan S, Sugumaran P, Kumar K (2022) Multichannel based iot malware detection system using system calls and opcode sequences. Int Arab J Inf Technol 19(2):261–271
Guang K, Tang G, Wang S, Song H, Bian Y (2016) Using deep learning for detecting Bot cloud. J Commun 37(11):114–128
Jung W, Yang H, Zhao M, Sun L, Zhou G (2020) IoT botnet detection via power consumption modelling. Smart Health Smart Health 15, Article ID 100103
McDermott CD, Majdani F, Petrovski AV (2018) Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the 2018 international joint conference on neural networks (IJCNN), Rio de Janeiro, Brazil, December 2018
Nguyen HT, Ngo QD, Nguyen DH, Le VH (2020) PSI-rooted subgraph: a novel feature for iot botnet detection using classifier algorithms. ICT Express 42
Zhao Y, Xie Y, Yu F, Ke Q, Yu Y, Chen Y, Gillum E (2009) BotGraph: large scale spamming botnet detection, NSDI’09. In: Proceedings of the 6th USENIX symposium on networked systems design and implementation, Boston, MA, USA, April 2009
Zhuang D, Chang JM (2017) PeerHunter: detecting peer-to-peer botnets through community behavior analysis. In: Proceedings of the 2017 IEEE conference on dependable and secure computing, Taipei, China, September 2017, pp 493–500
Albanese M, Jajodia S, Venkatesan S (2018) Defending from stealthy botnets using moving target defenses. IEEE Secur Priv 16(1):92–97
Spathoulas G, Giachoudis N, Damiris G-P, Theodoridis G (2019) Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets. Future Internet 11:226
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Verma, A., Bhattacharya, P., Prasad, V.K., Datt, R., Tanwar, S. (2023). AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders. In: Tanwar, S., Wierzchon, S.T., Singh, P.K., Ganzha, M., Epiphaniou, G. (eds) Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security. CCCS 2022. Lecture Notes in Networks and Systems, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-99-1479-1_64
Download citation
DOI: https://doi.org/10.1007/978-981-99-1479-1_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1478-4
Online ISBN: 978-981-99-1479-1
eBook Packages: EngineeringEngineering (R0)