2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI) 2020
DOI: 10.23919/eecsi50503.2020.9251304
|View full text |Cite
|
Sign up to set email alerts
|

IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…As this study proposes a bitmap-based compression technique that expresses the log data simply, simple machinelearning models are used to classify the log data. The conventional method refers to a study that classifies malicious IoT traffic data using various machine-learning algorithms [31]. The random forest (RF), DT, Naive Bayes (NB), and gradient boosting algorithms were used in the comparative study.…”
Section: Evaluation Results and Analysismentioning
confidence: 99%
“…As this study proposes a bitmap-based compression technique that expresses the log data simply, simple machinelearning models are used to classify the log data. The conventional method refers to a study that classifies malicious IoT traffic data using various machine-learning algorithms [31]. The random forest (RF), DT, Naive Bayes (NB), and gradient boosting algorithms were used in the comparative study.…”
Section: Evaluation Results and Analysismentioning
confidence: 99%
“…Therefore, it is critical to improve the security and privacy aspects of IoT devices and protect them against malware. Many types of research and studies are conducted to protect IoT devices against malware, and one such method is to use centralized techniques such as Machine Learning [1], [12] and Deep Learning [13], [14]. However, these centralized learning techniques share the user's private data with a centralized server to train the models.…”
Section: A Motivationmentioning
confidence: 99%
“…In general, the security issues faced by IoT devices are malware, weak password protection, exploitation, skill gaps, poor device management, insecure protocols, data leakage, firewall, secure booting, intrusion deception threat (IDT), authentication, and encryption [21][22][23]. Different methods have been utilized as defense strategies, such as (1) distributed deep learning (DDL) [24], (2) adversarial deep learning (ADL) [25], (3) the bidirectional short term memory based recurrent neural network (BLSTM-RNN) [26], (4) the artificial neural network (ANN) [27], (5) the deep neural network (DNN) [28], (6) existing network intrusion detection system (NIDS) implementation tools [29], (7) tensor DNN [30], (8) adversarial machine learning and other traditional methods (such as Petri Net) [25], (9) cloud-based distributed deep learning frameworks-(a) distributed convolution neural networks and (b) cloud based temporal long-short term memory [31]- (10) the uniform intrusion detection method [32], (11) the deep-learning-based intrusion detection system method with the combination of spider monkey optimization and a stacked-deep polynomial network [33], (12) the baptized BotIDS-based convolutional neural network [34], (13) CorrAUC [35], (14) K-nearest neighbors (KNN) and LSVM [36], (15) random forest (RF) [36][37][38], (16) neural networks [36,38], (17) decision trees (DTs) [36,37], and (18) supervised, unsupervised, semi-supervised, and reinforcement techniques [39,…”
Section: Defense Strategies and The Motivation For This Workmentioning
confidence: 99%