IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
Abstract
:1. Introduction
- The botmaster initially sends a command to the C&C server for the scanning of IP addresses of IoT nodes.
- Then, it chooses the legitimate communication channel using distinct techniques such as Telnet, IRC, etc.
- The loader server is utilized to load the malware or compromise the IoT nodes.
- Once the IoT node is compromised, it joins the army of bots and tries to infect other nodes in the same network.
- These devices are controlled by the C&C server and provide the instructions for propagating the same.
- Secured Device Configuration: The configuration of IoT devices should be secured via the modification of the default username and password. It also ensures that disabled unused features are regularly updated in firmware.
- Data Encryption: The data should be in an encrypted form during data in transit and protected from interception or unauthorized access. The involvement of protocols such as SSL/TLS is required for data encryption stored in the cloud.
- Network Segmentation: IoT networks are different than other networks that need to segregate IoT devices to minimize potential attacks and limit security breaches.
- Access Controls: A strong user-oriented access control is required that can involve biometric or multi-factor authentication (MFA) to define the restrictions of the access.
- Vendor Security Evaluation: IoT devices or sensors need to be bought from reputed vendors that provide security on a priority basis.
- Physical Security: A locked cabinet or enclosed environment is needed for the physical security of the IoT devices.
- Real-time Monitoring: IoT botnet mitigation requires real-time monitoring of the IoT traffic and analyzing it for any unrelated network packets.
- Patch Management: Regular updates to the firmware and the software including current security patches to deal with potential attacks and vulnerabilities.
- A novel IMTIBoT technique is proposed for the mitigation of IoT botnets.
- An efficient algorithm is proposed for the implementation of the stacking of ensemble classifiers.
- We implement the distinguishing classifier models for classification and regression tasks to predict the performance of the models.
- We compare and evaluate the results of the classifiers in terms of the distinct parameters.
2. Literature Review
3. Proposed Intelligent Mitigation Technique
3.1. IoT Botnet Module
3.2. Pre-Processing and Feature Selection Module
# Extract feature importance’s { importances = model.feature_importances_feature_names = x.columns } # Create a DataFrame for the importances { feature_importance_df = pd.DataFrame({ ‘Feature’: feature_names, ‘Importance’: importances }).sort_values(by = ‘Importance’, ascending = False) } |
3.3. Stacking Ensemble Classifier Module
Algorithm 1. StackingClassifier (D, E, T) |
Input: Supply training data that is present in terms of |
Output: Classification of data using similarity index Processing steps.
|
4. Results and Discussion
4.1. Parameters Based on the IoT Network Traffic
4.2. Average End-to-End Delay
4.3. Average Throughput
4.4. Packet Arrival Time
4.5. Packet Losses
4.6. Comparative Analysis
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Kalmeshwar, M.; Prasad, N. Internet Of Things: Architecture, Issues, and Applications. Int. J. Eng. Res. Appl. 2017, 7, 85–88. [Google Scholar] [CrossRef]
- De Donno, M.; Dragoni, N.; Giaretta, A.; Spognardi, A. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Secur. Commun. Netw. 2018, 2018, 7178164. [Google Scholar] [CrossRef]
- Providers, C.S.; Intelligence, T. Nokia Threat Intelligence Report—2019. Netw. Secur. 2018, 2018, 4. [Google Scholar] [CrossRef]
- Sasi, T.; Lashkari, A.H.; Lu, R.; Xiong, P.; Iqbal, S. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges. J. Inf. Intell. 2023; in press. [Google Scholar] [CrossRef]
- Baz, M. SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks. Sensors 2022, 22, 6505. [Google Scholar] [CrossRef]
- Masoudi-Sobhanzadeh, Y.; Emami-Moghaddam, S. A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier. Comput. Netw. 2022, 217, 109365. [Google Scholar] [CrossRef]
- NChaabouni; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutor. 2019, 21, 2671–2701. [Google Scholar] [CrossRef]
- Zhao, H.; Shu, H.; Xing, Y. A Review on IoT Botnet. In Proceedings of the the 2nd International Conference on Computing and Data Science, Stanford, CA, USA, 28–30 January 2021; ACM: New York, NY, USA, 2021. [Google Scholar] [CrossRef]
- Jain, S.; Pawar, P.M.; Muthalagu, R. Hybrid intelligent intrusion detection system for internet of things. Telemat. Inform. Rep. 2022, 8, 100030. [Google Scholar] [CrossRef]
- Ali, I.; Ahmed, A.I.; Almogren, A.; Raza, M.A.; Shah, S.A.; Khan, A.; Gani, A. Systematic Literature Review on IoT-Based Botnet Attack. IEEE Access 2020, 8, 212220–212232. [Google Scholar] [CrossRef]
- Khaire, U.M.; Dhanalakshmi, R. Stability of feature selection algorithm: A review. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 1060–1073. [Google Scholar] [CrossRef]
- Tzagkarakis, C.; Petroulakis, N.; Ioannidis, S. Botnet Attack Detection at the IoT Edge Based on Sparse Representation. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; IEEE: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
- Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks. IEEE Internet Things J. 2021, 8, 4944–4956. [Google Scholar] [CrossRef]
- Farooq, M.J.; Zhu, Q. Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2412–2426. [Google Scholar] [CrossRef]
- Beiknejad, H.; Vahdat-Nejad, H.; Moodi, H. P2P botnet detection based on traffic behavior analysis and classification. Int. J. Comput. Inf. Technol. 2018, 6, 2–16. [Google Scholar]
- Gao, Q.; Wu, H.; Zhang, Y.; Tao, X. Differential game-based analysis of multi-attacker multi-defender interaction. Sci. China Inf. Sci. 2021, 64, 222302. [Google Scholar] [CrossRef]
- Abbas, S.H. IDS feature reduction using two algorithms. Int. J. Civ. Eng. Technol. 2017, 8, 468–478. [Google Scholar]
- Lin, Y.; Zhu, X.; Zheng, Z.; Dou, Z.; Zhou, R. The individual identification method of wireless device based on dimensionality reduction and machine learning. J. Supercomput. 2017, 75, 3010–3027. [Google Scholar] [CrossRef]
- Salo, F.; Nassif, A.B.; Essex, A. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 2019, 148, 164–175. [Google Scholar] [CrossRef]
- Mutlaq, K.A.A.; Madhi, H.H.; Kareem, H.R. Addressing big data analytics for classification intrusion detection system. Period. Eng. Nat. Sci. 2020, 8, 693–702. [Google Scholar]
- Susanto; Stiawan, D.; Rini, D.P.; Arifin, M.A.; Idris, M.Y.; Alsharif, N.; Budiarto, R. Dimensional Reduction with Fast ICA for IoT Botnet Detection. J. Appl. Secur. Res. 2022, 18, 665–688. [Google Scholar]
- Chaganti, R.; Bhushan, B.; Ravi, V. A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions. Comput. Commun. 2023, 197, 96–112. [Google Scholar] [CrossRef]
- Djenna, A.; Bouridane, A.; Rubab, S.; Marou, I.M. Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation. Symmetry 2023, 15, 677. [Google Scholar] [CrossRef]
- Lawal, M.A.; Shaikh, R.A.; Hassan, S.R. An anomaly mitigation framework for iot using fog computing. Electronics 2020, 9, 1565. [Google Scholar] [CrossRef]
- Khazane, H.; Ridouani, M.; Salahdine, F.; Kaabouch, N. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks. Future Internet 2024, 16, 32. [Google Scholar] [CrossRef]
- Pozzebon, A. Edge and Fog Computing for the Internet of Things. Future Internet 2024, 16, 101. [Google Scholar] [CrossRef]
- Alrubayyi, H.; Alshareef, M.S.; Nadeem, Z.; Abdelmoniem, A.M.; Jaber, M. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. Future Internet 2024, 16, 85. [Google Scholar] [CrossRef]
- Ullah, I.; Mahmoud, Q.H. A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks. In Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020; pp. 134–140. [Google Scholar] [CrossRef]
- Khan, S.; Mailewa, A.B. Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps. Microprocess. Microsyst. 2023, 97, 104753. [Google Scholar] [CrossRef]
- Nataraj, L.; Karthikeyan, S.; Jacob, G.; Manjunath, B.S. Malware Images, Visualization and Automatic. ACM. July 2011. Available online: https://vision.ece.ucsb.edu/sites/vision.ece.ucsb.edu/files/publications/nataraj_vizsec_2011_paper.pdf (accessed on 29 April 2024).
- Su, J.; Vasconcellos, V.D.; Prasad, S.; Daniele, S.; Feng, Y.; Sakurai, K. Lightweight Classification of IoT Malware Based on Image Recognition. Proc. Int. Comput. Softw. Appl. Conf. 2018, 2, 664–669. [Google Scholar] [CrossRef]
- Gibert, D.; Mateu, C.; Planes, J. HYDRA: A multimodal deep learning framework for malware classification. Comput. Secur. 2020, 95, 101873. [Google Scholar] [CrossRef]
Reference | Classifier | Dataset | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|---|---|
Nataraj et al. [30] | KNN | Anubis | 0.9808 | - | - | - |
Su et al. [31] | CNN | IoTPOT | 0.9400 | - | - | - |
Gibert et al. [32] | Multi-level Deep NN | BIG | 0.973 | 0.96 | 0.93 | 0.940 |
Susanto et al. [21] | KNN, RF, DT | N-BaIoT | 0.9995 | 0.9993 | 0.9977 | 0.9977 |
Khan et al. [29] | ANN | NSL-KDD | 0.9986 | 0.652 | 1.000 | 0.955 |
Proposed Model | Ensemble Learning (Adaboost + XGBoost + Random Forest) and Random Clustering | Simulated Environment and IoT botnet dataset | 0.984 | 0.982 | 0.975 | 0.981 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Garg, U.; Kumar, S.; Mahanti, A. IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet 2024, 16, 212. https://doi.org/10.3390/fi16060212
Garg U, Kumar S, Mahanti A. IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet. 2024; 16(6):212. https://doi.org/10.3390/fi16060212
Chicago/Turabian StyleGarg, Umang, Santosh Kumar, and Aniket Mahanti. 2024. "IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets" Future Internet 16, no. 6: 212. https://doi.org/10.3390/fi16060212
APA StyleGarg, U., Kumar, S., & Mahanti, A. (2024). IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet, 16(6), 212. https://doi.org/10.3390/fi16060212