• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于机器学习的物联网僵尸网络攻击检测的序列架构。

Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.

机构信息

Department of Informatics, Kyushu University, Fukuoka 819-0395, Japan.

Department of Electrical and Information Engineering, Universitas Gadjah Mada, Yogyakarta 55281, Indonesia.

出版信息

Sensors (Basel). 2020 Aug 5;20(16):4372. doi: 10.3390/s20164372.

DOI:10.3390/s20164372
PMID:32764394
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7472319/
Abstract

With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational resource for robust security mechanisms. Moreover, many existing rule-based detection systems can be circumvented by attackers. In this study, we proposed a machine learning (ML)-based botnet attack detection framework with sequential detection architecture. An efficient feature selection approach is adopted to implement a lightweight detection system with a high performance. The overall detection performance achieves around 99% for the botnet attack detection using three different ML algorithms, including artificial neural network (ANN), J48 decision tree, and Naïve Bayes. The experiment result indicates that the proposed architecture can effectively detect botnet-based attacks, and also can be extended with corresponding sub-engines for new kinds of attacks.

摘要

随着物联网 (IoT) 设备的快速发展和普及,针对这些设备的网络攻击越来越多。据称,物联网环境中的大多数攻击都是基于僵尸网络的攻击。由于大多数物联网设备的内存和计算资源不足,无法实现强大的安全机制,因此仍然存在许多安全漏洞。此外,许多现有的基于规则的检测系统可能会被攻击者规避。在这项研究中,我们提出了一种基于机器学习 (ML) 的僵尸网络攻击检测框架,采用顺序检测架构。采用一种有效的特征选择方法,实现了具有高性能的轻量级检测系统。使用三种不同的机器学习算法,包括人工神经网络 (ANN)、J48 决策树和朴素贝叶斯,对僵尸网络攻击检测的整体检测性能达到了 99%左右。实验结果表明,所提出的架构可以有效地检测基于僵尸网络的攻击,并且还可以通过相应的子引擎进行扩展,以检测新的攻击类型。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/d5b5d562b43a/sensors-20-04372-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/808004cf330c/sensors-20-04372-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/98ee7be4754e/sensors-20-04372-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/df3b51129601/sensors-20-04372-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/68288255405a/sensors-20-04372-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/929a8ba83ca7/sensors-20-04372-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/d5b5d562b43a/sensors-20-04372-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/808004cf330c/sensors-20-04372-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/98ee7be4754e/sensors-20-04372-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/df3b51129601/sensors-20-04372-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/68288255405a/sensors-20-04372-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/929a8ba83ca7/sensors-20-04372-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/43cb/7472319/d5b5d562b43a/sensors-20-04372-g006.jpg

相似文献

1
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.基于机器学习的物联网僵尸网络攻击检测的序列架构。
Sensors (Basel). 2020 Aug 5;20(16):4372. doi: 10.3390/s20164372.
2
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
3
IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection.基于优化极端梯度提升和特征选择的物联网僵尸网络攻击检测。
Sensors (Basel). 2020 Nov 6;20(21):6336. doi: 10.3390/s20216336.
4
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
5
Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet.基于交叉深度学习的物联网僵尸网络传播检测方法
Sensors (Basel). 2022 May 20;22(10):3895. doi: 10.3390/s22103895.
6
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.基于蜜罐与机器学习的物联网智能工厂中僵尸网络攻击分类
PeerJ Comput Sci. 2021 Jan 25;7:e350. doi: 10.7717/peerj-cs.350. eCollection 2021.
7
Lightweight Internet of Things Botnet Detection Using One-Class Classification.基于单类分类的轻量级物联网僵尸网络检测。
Sensors (Basel). 2022 May 10;22(10):3646. doi: 10.3390/s22103646.
8
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
9
Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices.用于异构物联网设备中僵尸网络检测的集成平均深度神经网络。
Sci Rep. 2024 Feb 16;14(1):3878. doi: 10.1038/s41598-024-54438-6.
10
A comparative analysis of using ensemble trees for botnet detection and classification in IoT.物联网中使用集成树进行僵尸网络检测和分类的比较分析。
Sci Rep. 2023 Dec 7;13(1):21632. doi: 10.1038/s41598-023-48681-6.

引用本文的文献

1
Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm.基于混合深度学习算法的针对各种攻击的智能入侵检测系统
Sensors (Basel). 2025 Jan 20;25(2):580. doi: 10.3390/s25020580.
2
Enhanced botnet detection in IoT networks using zebra optimization and dual-channel GAN classification.基于斑马优化和双通道生成对抗网络分类的物联网网络中僵尸网络增强检测
Sci Rep. 2024 Jul 26;14(1):17148. doi: 10.1038/s41598-024-67865-2.
3
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.
通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.
4
Botnet Defense System: Observability, Controllability, and Basic Command and Control Strategy.僵尸网络防御系统:可观测性、可控性和基本命令与控制策略。
Sensors (Basel). 2022 Dec 2;22(23):9423. doi: 10.3390/s22239423.
5
Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System.用于僵尸网络防御系统中战术响应的机器学习白帽蠕虫发射器
Sensors (Basel). 2022 Jun 21;22(13):4666. doi: 10.3390/s22134666.
6
A Novel Forward-Propagation Workflow Assessment Method for Malicious Packet Detection.一种用于恶意数据包检测的新型前向传播工作流评估方法。
Sensors (Basel). 2022 May 30;22(11):4167. doi: 10.3390/s22114167.
7
Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network.有效特征选择方法可用于检测 5G 核心网络中的物联网 DDoS 攻击。
Sensors (Basel). 2022 May 18;22(10):3819. doi: 10.3390/s22103819.
8
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
9
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.基于机器学习的物联网网络攻击分类的实验分析。
Sensors (Basel). 2021 Jan 10;21(2):446. doi: 10.3390/s21020446.
10
Explainable Security in SDN-Based IoT Networks.基于 SDN 的物联网网络中的可解释安全。
Sensors (Basel). 2020 Dec 20;20(24):7326. doi: 10.3390/s20247326.