2020 IEEE 23rd International Multitopic Conference (INMIC) 2020
DOI: 10.1109/inmic50486.2020.9318106
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Universal Features Set for IoT Botnet Attacks Detection

Abstract: The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT devices are compromised and become the part of a botnet, the attackers use this botnet to launch the large and complex distributed denial of service (DDoS) attacks which take down the target websites or services and make them unable to respond the legitimate users. So far, many botnet detection techniques have been proposed but their performance is l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…Feature selection plays a significant role in the performance of a machine learning model. After preprocessing the data, we applied a Logistic Regression (LR) algorithm due to its efficient implementation in the existing literature [3,18]. Using the LR algorithm, we selected the ten most significant features to train and test the machine learning models: ['frame.time_delta', 'tcp.time_delta', 'tcp.flags.ack', 'tcp.flags.push', 'tcp.flags.reset', 'mqtt.hdrflags', 'mqtt.msgtype', 'mqtt.qos', 'mqtt.retain', 'mqtt.ver'].…”
Section: Features Selectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Feature selection plays a significant role in the performance of a machine learning model. After preprocessing the data, we applied a Logistic Regression (LR) algorithm due to its efficient implementation in the existing literature [3,18]. Using the LR algorithm, we selected the ten most significant features to train and test the machine learning models: ['frame.time_delta', 'tcp.time_delta', 'tcp.flags.ack', 'tcp.flags.push', 'tcp.flags.reset', 'mqtt.hdrflags', 'mqtt.msgtype', 'mqtt.qos', 'mqtt.retain', 'mqtt.ver'].…”
Section: Features Selectionmentioning
confidence: 99%
“…Furthermore, it is estimated that by 2025 there will be 75.44 billion IoT connected worldwide [1]. IoT footprints have been identified in various domains such as manufacturing, agriculture, transportation, electric grid, healthcare, among others [2][3][4]. In an IoT-based healthcare system, security is the primary concern as the data is directly related to human beings.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The recent trends reveal that the cyber-attacks increasing day by day with the rapid increase of insecure IoT devices [6]. Among the recently reported cyber-attacks, botnet and distributed denial of service (DDoS) attacks are the most prevalent attacks, which are increased both in frequency and magnitude over the last decade [4], [6]. A botnet attack is a cyber-attack in which an attacker first scans a network to look for weakly secured or vulnerable (IoT) devices.…”
Section: Introductionmentioning
confidence: 99%