0% found this document useful (0 votes)
39 views6 pages

Distributed Denial of Services (Ddos) & Iot Botnet Malware Identification Using Machine Learning & Deep Learning Models

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views6 pages

Distributed Denial of Services (Ddos) & Iot Botnet Malware Identification Using Machine Learning & Deep Learning Models

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

Distributed Denial of Services (DDoS) & IoT


Botnet Malware Identification Using Machine
Learning & Deep Learning Models
Indrajeet Kumar
Graphic Era Hill University Manvi Bohra Noor Mohd
Dehradun, India-248002 Graphic Era Hill University Graphic Era Deemed to be University,
Adjunct Professor, Graphic Era Dehradun, India. Dehradun, India
Deemed to be University, [email protected] [email protected]
Dehradun, India-248001
[email protected]

Teekam Singh
Graphic Era Deemed to be University,
Dehradun, India
[email protected]

Abstract— In this work, distributed denial of services office, a smart refrigerator that records the available balances
(DDoS) and IoT botnet attacks detection has been performed in it and orders whenever necessary, automating a smart
using machine learning (ML) and deep learning (DL) models. city’s traffic regulation systems, etc. IoT devices can also
For the implementation of the proposed work DDoS attacks communicate with each other and other systems, and, as a
and IoT botnet datasets are used. These instances are collected result, enable collaborative actions and complex interactions.
by the implementation of Mirai and BASHLITE. The used
dataset comprises of 7999 instances and each instance has 29 An IoT botnet is a group of Internet of Things devices
attributes. The collected instances are pre-processed and that have been compromised by malware and are being used
eliminate the redundant attributes. Therefore, finally a set of by an attacker from a distant location. Attacker utilization of
10 attributes are selected for the experiments. After this dataset the botnet can include DDoS assaults [1], [2], spam
is divided into training and testing set. By using training set, promotion email, data theft, and other nefarious activities.
machine leaning models (KNN classifier, logistic regression, The most important issue is security and privacy. IoT devices
SVM model, random forest model) and deep learning models are prone to hacking and unauthorized data breaches, which
(CNN and LSTM) are trained and validated using testing set. makes people at risk of either spreading their personal
After the experiments it has been found that the deep learning- information or gaining control over their systems. Moreover,
based LSTM model obtained outstanding performance in
due to the high amount of the data devices handle, the
terms of accuracy. The obtained testing accuracy for LSTM
model is 99.80 % and 99.82 % for training accuracy.
question of data privacy is challenging, as well. Another
issue related to security in the realm of IoT is lack of
Keywords— Internet of Things (IoTs), IoT botnet, established standards and principles of interoperability and
Distributed denial of services (DDoS) attacks, Machine security online. Figure 1 represents the structure of IoT
Learning, CNN, LSTM. environment.

I. INTRODUCTION
The Internet of Things (IoTs) is a system of organized
computation electronic gadgets, power-driven and digital
machines, individuals, and persons or human-generated
objects that are able to perform significant task in well-
defined manner and preserve an capability to send or receive
data over a network oriented platform without intervention of
human-to-computer involvement. IoT catalyses new
computer solution architectures that are more long-term, real-
time and autonomously implemented. IoT devices are
connected to the internet and thus can send and receive data.
They collect data from the environment via various sensors,
including temperature, motion, and sound, among others. The
data can be analysed to develop insights, basis for decision-
making, and used in automation. IoT also makes it possible
to automate various activities easily [1]. For example, a
homeowner can set an optimum temperature for the home or

979-8-3503-8386-7/24/$31.00 ©2024 IEEE


2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

Fig. 1. Structure of IoTs environment transmitting modes, and normal mode. In this work, an
independent self-governing defence model that uses edge
IoT environments also are deeply affected by DDoS computing and a 2-D-CNN is used and able to recognize the
attacks [3]. “In a DDoS attack, a goal is bombarded with attacks of type DDoS in IoT environment. The 2D-CNN
traffic so large that their normal operation is disrupted attained the training accuracy of 99.50 % and 99.8 % for
multiple times”. Due to the wide deployment of the device, network packet traffic and network packet features
the lack of security, and the restriction in terms of computing identification, respectively.
power, IoT devices are prime candidates for being infected In this study [9] the novel intrusion detection system
and used in a botnet for DDoS attacks. To perform DDoS based on ML based model and CNN models implicitly
attacks, a criminal creates an IoT botnet. In this case many differentiated over the records timestamps and henceforth
IoT devices that have fallen under the attacker’s control due accomplished an average accuracy > 99 % with three distinct
to software vulnerabilities or weak passwords join the botnet. attribute sets for two class and more than two classifications.
Further, the DDoS criminal establishes control over the The procedure in this work does not avoid territories between
botnet. And perform the necessary actions like creates a features, as triggered by the flow data generator.
command-and-control (C&C) server, with which he can
communicate with other infected IoT devices and make a The study [10], detect the eleven DDoS attacks from
network request to send traffic to the target so that it exceeds multiple DDoS attack datasets, the use of 6 ML classification
its limits. The last step is the selection of a target to place a algorithms was used. This study used the CICDDoS2019,
load on it [4], [5]. The cleared botnet should send traffic to an one of the datasets obtained from the CICDS. The
attacker-selected target to cause the target to malfunction. classification methods were experimented with each DDoS
The major impact of DDoS attacks is like Service disruption, attack to determine the optimal classification algorithms.
financial loss, extensive use of resources etc. Generally, it would be possible to conduct work to assess the
efficiency of the ML based classification algorithms in the
II. LITERATURE SURVEY detection of DDoS attacks. This work used performance
This section has shown the advancement in employing matrices (accuracy, precision, recall, and F1-score) to
ML and DL methods (CNN & LSTM) to identify DDoS determine the suitability of each model.
assaults in IOT networks. Investigation is still being
conducted on new models and algorithms to better advance III. MATERIALS & METHODOLOGY
the detection and avoidance of these attacks on internet of A. Dataset Description
things networks. More recently performed works have shown
The used dataset is collected from Mirai type botnet
promising outcomes for the use of ML and DL methods
attacking an emulated IoT network in OpenStack. Mirai
(CNN & LSTM) models in identifying DDoS assaults in
botnet is a famous botnet that seizes the mentioned
different network environments, particularly in IOT [5].
vulnerabilities of Internet of Things, such as the default
Numerous algorithms and feature selection methods have
password at creation, obsolete firmware, and compromising
been implemented due to varying levels of detection
network services. According to CISA the attackers behind
accuracy and timing.
Mirai access multiple vulnerable IoT devices in large
The study recognizes the need to improve intrusion numbers [5]. The actor thereafter uses this acquired power to
detection systems in lightweight IoT networks, innovates a launch DDoS attacks and other malicious activities. The used
novel data pre-processing technique. This approach ideally dataset set comprised of 7999 cases. Each case is consisting
resolves the peculiarities of IoT networks and further of twenty-nine attributes. All attributes are not important for
enhances the goal of promoting cybersecurity through the detection of attacks, therefore only ten attributes are
successful detection of DDoS attacks because of the selected. The correlation matrix of these selected attributes
accumulation of each IoT devices’ set of constraints. The age given in Figure 2.
experiment utilized the TON-IOT and BOTNET-IOT
datasets [6]. However, the experiment used the binary
classification and multiple-class classification models to
separate the DDoS attacks from the other two types of
attacks.
This study is investigating the utilization of machine
learning and deep learning techniques in identifying and
distinguishing the impacts of DDoS assault in IoT networks.
In order to establish if the network has experienced or not
experienced the attack, adequate detection techniques must
be followed [7]. The detection uses suitable techniques such
as artificial intelligence which heavily relies on Machine
Learning and Deep Learning. Supervised machine learning
based models or algorithms used structured data to learn,
detect or identify the outcomes of the work, and recognize
patterns.
This paper [8] has shown that an autonomous defence
system using edge computing and a 2D-CNN can achieve
autonomous and correct recognition of attacking patterns, Fig. 2. Correlation matrix selected feature set.

979-8-3503-8386-7/24/$31.00 ©2024 IEEE


2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

B. Proposed model
The proposed model comprises of data preprocessing,
dataset bifurcation, model training and decision of the model.
The flowchart of proposed model is given in Figure 3. The
description of each stage is given in details as:
C. Data preprocessing
Data preprocessing is one of the essential steps in the
development of model for identification of DDoS attacks and
IoT botnet attacks using machine learning, and it converts
raw data into clean and formatted data for modelling. High-
quality data preprocessing can contribute to the significantly
improved performance of the learning model and provide
accurate and valid results. Data preprocessing covers data
collection, data cleaning, data normalization, and data
splitting. Data Collection is a process of gathering data from
different sources such as databases, APIs, or files. Ensure
that the data is representative of the problem you wish to
solve. In data cleaning replaces the missing values with a
given value like the mean, median, or mode and delete the
rows or columns having missing values, or outliers can be
removed or transformed. Data Normalization includes
normalization, which scales data to a standardized range of
0-1. Splitting Data – split the data into training and testing
sets in the ratio of 80:20.

Fig. 3. Experimental work flow chart

D. Classification Models
KNN classifier: K-Nearest Neighbours (KNN) is the
simple and straightforward supervision ML algorithm used
for classification tasks. KNN identifies [11] the category of a
new observation based on its proximity to known
observations. It’s implemented during a supervised learning
task where a learning algorithm is assigned a labelled data
set. Meaning, it’s going to label input data, assigning it to a
label like, binary category, category name, anomaly, etc., to
supply a model which will be wont to predict a target
outcome. Steps involved in this model is given as:
 Input: A dataset with feature values and the
corresponding labels.
 Normalize Data: It may be useful, but not necessary, to
standardize or normalize the data so that the distance
metric makes sense.
 Choose k: For k-means, it is necessary to select an odd
value of k to completely bypass situations with a tie in
classification.
 Find Nearest Neighbours: For any data point, the
distance to the rest of the data points is calculated and
we select the k-nearest neighbours.

979-8-3503-8386-7/24/$31.00 ©2024 IEEE


2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

 Classification: Now, a new label is predicted for k- the dataset when training each decision tree into each
nearest neighbours using the majority class by bootstrapped sample.
classification. Convolutional Neural Network:
Logistic regression: Logistic regression (LR) is a simple, yet Convolutional neural networks (CNN) are DL based
widely used, ML algorithm that is used for both binary and model used for tasks that involve image data most frequently
multiclass classification [12]. In logistic regression the [15]. Although being used for other types of data such as
objective of this ML is to guess the probability that a known NLP and time-series, they have shown outstanding
input goes to a certain class. It is mainly utilized for binary performance in the context of spatial data. As for the
classification, which means classifying a certain set of data methods and techniques, it is one of the automatic feature
into only two classes. It can be wattled simply for predicting extraction algorithms that succinctly describes the features of
multi-class classification difficulties utilizing an analytical data. CNNs [15] are powerful neural networks that are
technique like one-vs-all, one-vs-one or directly SoftMax particularly useful for processing and analysing spatial data,
regression. LR uses logistic function or Sigmoid Function for most notably images. They are effective in finding complex
classification task [12]. The output of LR is modelled as the patterns and relationships about the data and can be
probability value that an input belongs to a certain class. transferred to other domains; however, they have mastered
Logistic function, an S shaped curve, maps the output of a the architecture and advanced techniques to perform well.
linear function to a probability value in the range of 0 to 1. Figure 4 shows the architecture of CNN.
Any real number is squashed to within the range of values 0
to 1. It is defined as follows:

(1)

Support Vector Machine: SVM is one of the most


conventional approaches used for supervised learning for Fig. 4. CNN architecture.
classification tasks [13]. However, it can also be used in
regression. SVM is particularly useful when it comes to high- Long Short-Term Memory (LSTM)
dimensional feature spaces. SVM creates the best decision Long Short-Term Memory (LSTM) [16] is a class of
boundary, especially when the classes are linearly separable. recurrent neural networks that is developed to model and
The SVM tries to detect the best hyperplane that separates process sequence data such as time series, speech, and text.
the classes. This is defined as the one that has the maximum LSTMs are highly effective at modelling long-term
distance between the closest training data and the hyperplane. dependencies and overwhelming the declining gradient
The closest vectors that have the maximum impact on the problem in traditional RNNs. LSTMs are a key tool for
best separating hyperplane are known as support vectors. processing sequential data, especially with long-term
SVM can also apply to non-linear dataset using a kernel trick dependencies. The LSTM model possesses versatility and
which converts the data into a distinguished dimension where strength in many uses, such as time series, speech analysis, or
natural language processing [16]. When the parameters are
it is easier to classify [13]. Common kernels include a linear,
effectively tuned and a variety of regularization capabilities
polynomial, radial basis kernel function and sigmoid kernel.
are used, an LSTM process can be trained to perform well on
a specific implementation. The structural design of LSTM
Random Forest: Random Forest (RF) classifier [14] is an model is given in Figure 5.
combination learning model that is widely used to perform
classification as well as regression tasks. It utilizes several E. Performance Analysis Metrics
decision trees to create a strong and accurate model. Random The performance of a classifier can be evaluated by
Forest is a great method that consistently achieves strong several metrics that check for accuracy, precision, recall, and
results in classification tasks. It uses various decision trees to f1-score. Metric measures help identify how good a classifier
make the model tighter and more flexible. It works well in may be, in terms of getting instances correct as well as
situations where there is a combination of decent data [14]. minimizing false positives and false negatives. The value of
By tuning hyperparameters and selecting appropriate these parameters has been computed according to the
features, higher accuracy can be achieved for this problem. obtained confusion matrix (CM). The sample confusion
matrix is given in Figure 6 and mathematical formula for the
The following are critical random forest principles: parameters is given in Equation 2 to Equation 5.
 Ensemble Learning: In general, Random Forest
combines the output of more than one decision tree.
This reduces the possibility of overfitting while
enhancing overall accuracy.
 Bagging: In Bagging, also known as Bootstrap
Aggregation, each decision tree receives a randomly
drawn bootstrap sample from the original dataset. This
step enables different models to achieve varying results.
 Random Feature Selection: Unlike traditional decision
trees that use data subsets, Random Forest assembles

979-8-3503-8386-7/24/$31.00 ©2024 IEEE


2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

92.68 % on the testing set. A Logistic Regression calculated


score is 94.27 % of accuracy on the training dataset and
90.87% on the testing dataset. Although, SVM produced
lower performance metrics on the testing set with high
precision but low recall.
Table 1: Obtained outcomes for used classification model.
Mod Confusion Matrix Precisi Reca F1- Accuracy (%)
el on (%) ll scor
Clas Clas (%) e Traini Testi
s0 s1 (%) ng ng
KNN Clas 116
68
s0 1 95.9 95.2
94.47 93.57 92.68
Clas 5 0
49 322
s1
LR Clas 120
27
s0 2 90.9 94.2
97.80 90.43 90.87
Clas 9 7
119 252
Fig. 5. Architecture of LSTM model s1
SVM Clas 122
0
s0 9 76.8 86.8
100 75.82 76.82
Clas 1 9
371 0
s1
RF Clas 122
0
s0 9 94.6 97.2
100 95.76 95.43
Clas 8 7
69 302
s1
CNN Clas 113
90
s0 9 97.6 97.9
98.29 97.79 96.88
Clas 6 7
157 229
s1
LST Clas 122
2
M s0 7 99.9 99.8
99.84 99.83 99.80
Clas 2 8
1 370
s1
Random Forest scored highly on all performance metrics
with high precision and recall compared to the models with
strong performance. CNN model factored in a 97.97% F1-
score on the training set and 96.88% on the testing set.
Relative to the other algorithms, LSTM model performance
Fig. 6. Confusion matrix representation. was exceptional as it scored all parameters extremely high on
the training and testing sets. Hence close to a perfect 100 %.

(2)

(3)

(4)

(5)

IV. RESULT ANALYSIS


The results given in Table1 describe the performance
metrics of six ML models that have been trained and tested
on a problem of classification. This information includes the
confusion matrix and other pieces of information, namely
precision, recall, F1-score, and accuracy rates for both
training set and testing sets. The extensive experiments have
been carried out for the detection of DDoS attacks and IoT
botnet attacks using six classifiers KNN classifier, LR model,
SVM, RF model, CNN model and LSTM model as a
classifier.
The percentage of correct predictions from all the models
on the training and testing data has been also recorded. KNN Fig. 7. Accuracy curve and loss curve for best performing model
Classifier scored 95.20 % of accuracy on the training set and

979-8-3503-8386-7/24/$31.00 ©2024 IEEE


2024 Second International Conference on Advance in Information Technology (ICAIT-2024)

IoT Networks," IEEE Internet of Things Journal, vol. 8, no. 8, pp.


(LSTM).
6591-6607, 15 April15, 2021.
[6] S. Sadhwani, B. Manibalan, R. Muthalaguand P. Pawar, “A
Lightweight Model for DDoS Attack Detection Using Machine
Conclusion Learning Techniques”, Applied Sciences, vol. 13, no. 17, p. 9937,
Apr. 2023.
In conclusion, IoT botnet is compromised by malware
[7] A. A. Alahmadi, “DDoS Attack Detection in IoT-Based Networks
and then used from a distant location by an attacker. Using Machine Learning Models: A Survey and Research
Specifically, attacker usage of the botnet can include DDoS Directions”, Electronics, vol. 12, no. 14, p. 3103, Apr. 2023.
promotion through spam email, email, data theft, and other [8] S. H. Lee, Y. L. Shiue, C. H. Cheng, Y. H. Liand Y. F. Huang,
activities that are harmful. It is essential that security and “Detection and prevention of DDoS attacks on the IoT”, Applied
privacy are maintained. Indeed, the IOT devices are hacked, Sciences, vol. 12, no. 23, p. 12407, Apr. 2022.
and their penetration of personal data is maintained. Hence, it [9] J. G. Almaraz-Rivera, J. A. Perez-Diazand J. A. Cantoral-Ceballos,
is an instance of either people spreading personal information “Transport and application layer DDoS attacks detection to IoT
devices by using machine learning and deep learning models”,
or a serious problem of an increased tendency to have their Sensors, vol. 22, no. 9, p. 3367, Apr. 2022.
systems taken. DDoS attacks and IoT botnet datasets are [10] K. B. Dasari and N. Devarakonda, “Detection of Different DDoS
employed for the implementation of the proposed work. Attacks Using Machine Learning Classification Algorithms”,
These instances are generated through implementing the Ingénierie des Systèmes d Inf., vol. 26, no. 5, pp. 461–468, Apr. 2021.
Mirai and BASHLITE. Then the dataset is separated into the [11] Y. Liao and V. R. Vemuri, “Use of k-nearest neighbor classifier for
training dataset and testing dataset. The training set is used to intrusion detection”, Computers & security, vol. 21, no. 5, pp. 439–
train the machine leaning models and deep learning models 448, Apr. 2002.
on other hand the testing set is used to validate the trained [12] C. Ioannou and V. Vassiliou, “An intrusion detection system for
constrained WSN and IoT nodes based on binary logistic regression”,
models. The experiments result show that the proposed deep in Proceedings of the 21st ACM International Conference on
learning-based LSTM model reaches a excellent performance Modeling, Analysis and Simulation of Wireless and Mobile Systems,
in form of accuracy, precision, recall, and f1-score. Further pp. 259-263, Oct. 2018.
similar kind of work can be extended for the other attacks in [13] M. Mohammadi, “A comprehensive survey and taxonomy of the
IoT environments and 5G networks. SVM-based intrusion detection systems”, Journal of Network and
Computer Applications, vol. 178, p. 102983, Apr. 2021.
REFERENCES [14] J. Zhang, M. Zulkernine and A. Haque, "Random-Forests-Based
Network Intrusion Detection Systems," in IEEE Transactions on
[1] J. M. Kizza, “Internet of things (iot): growth, challenges, and Systems, Man, and Cybernetics, Part C (Applications and Reviews),
security.”, Guide to Computer Network Security, pp. 557–573, Apr. vol. 38, no. 5, pp. 649-659, Sept. 2008.
2024. [15] J. Kim, J. Kim, H. Kim, M. Shim, & E. Choi, “CNN-based network
[2] T. A. Tuan, H. V. Long, L. H. Sơn, R. Kumar, I. Priyadarshini, and N. intrusion detection against denial-of-service attacks.” Electronics,
T. K. Son, “Performance evaluation of Botnet DDoS attack detection 9(6), 916, 2020.
using machine learning,” Evolutionary Intelligence, vol. 13, no. 2, pp. [16] . A. Althubiti, E. M. Jones and K. Roy, "LSTM for Anomaly-Based
283–294, Nov. 2019. Network Intrusion Detection," 2018 28th International
[3] W. Chen, H. Zhang, X. Zhou, and Y. Weng, “Intrusion detection for Telecommunication Networks and Applications Conference (ITNAC),
modern DDOS attacks classification based on convolutional neural Sydney, NSW, Australia, 2018, pp. 1-3,
networks,” in Studies in computational intelligence, 2021, pp. 45–60. [17] S. Goel, S. Gupta, A. Panwar, S. Kumar, M. Verma, S. Bourouis, &
[4] S. Peneti and H. E, "DDOS Attack Identification using Machine M. Ullah, «Deep learning approach for stages of severity
Learning Techniques," 2021 International Conference on Computer classification in diabetic retinopathy using color fundus retinal
Communication and Informatics (ICCCI), Coimbatore, India, 2021, images. Mathematical Problems in Engineering”, 2021, 1-8.
pp. 1-5. [18] I. Kumar, A. Kumar, V. Kumar, R. Kannan, V. Vimal, K.U. Singh &
[5] K. L. K. Sudheera, D. M. Divakaran, R. P. Singh and M. Gurusamy, M. Mahmud, “Dense tissue pattern characterization using deep neural
"ADEPT: Detection and Identification of Correlated Attack Stages in network”. Cognitive computation, 14(5), 1728-1751, 2022.

979-8-3503-8386-7/24/$31.00 ©2024 IEEE

You might also like