• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网中使用集成树进行僵尸网络检测和分类的比较分析。

A comparative analysis of using ensemble trees for botnet detection and classification in IoT.

作者信息

Saied Mohamed, Guirguis Shawkat, Madbouly Magda

机构信息

Institute of Graduate Studies and Research, Alexandria, Egypt.

出版信息

Sci Rep. 2023 Dec 7;13(1):21632. doi: 10.1038/s41598-023-48681-6.

DOI:10.1038/s41598-023-48681-6
PMID:38062069
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10703784/
Abstract

Enhancing IoT security is a corner stone for building trust in its technology and driving its growth. Limited resources and diversified nature of IoT devices make them vulnerable to attacks. Botnet attacks compromise the IoT systems and can pose significant security challenges. Numerous investigations have utilized machine learning and deep learning techniques to identify botnet attacks in IoT. However, achieving high detection accuracy with reasonable computational requirements is still a challenging research considering the particularity of IoT. This paper aims to analytically study the performance of the tree based machine learning in detecting botnet attacks for IoT ecosystems. Through an empirical study performed on a public botnet dataset of IoT environment, basic decision tree algorithm in addition to ensemble learning of different bagging and boosting algorithms are compared. The comparison covers two perspectives: IoT botnet detection capability and computational performance. Results demonstrated that the significant potential for the tree based ML algorithms in detecting network intrusions in IoT environments. The RF algorithm achieved the best performance for multi-class classification with accuracy rate of 0.999991. It achieved also the highest results in all other measures.

摘要

增强物联网安全性是建立对其技术的信任并推动其发展的基石。物联网设备资源有限且性质多样,使其容易受到攻击。僵尸网络攻击会危及物联网系统,并可能带来重大安全挑战。众多研究已利用机器学习和深度学习技术来识别物联网中的僵尸网络攻击。然而,考虑到物联网的特殊性,在满足合理计算要求的情况下实现高检测准确率仍是一项具有挑战性的研究。本文旨在分析研究基于树的机器学习在检测物联网生态系统中的僵尸网络攻击方面的性能。通过对一个公开的物联网环境僵尸网络数据集进行实证研究,比较了基本决策树算法以及不同装袋和提升算法的集成学习。比较涵盖两个方面:物联网僵尸网络检测能力和计算性能。结果表明,基于树的机器学习算法在检测物联网环境中的网络入侵方面具有巨大潜力。随机森林(RF)算法在多类分类中表现最佳,准确率达到0.999991。它在所有其他指标上也取得了最高成绩。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/107dca62161e/41598_2023_48681_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/357b44b39255/41598_2023_48681_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/1094b88a8ae1/41598_2023_48681_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/53c5bbda18b5/41598_2023_48681_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/ff85f8b65adf/41598_2023_48681_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/a2c34ea4c1ea/41598_2023_48681_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/aa6c94dcbc9e/41598_2023_48681_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/107dca62161e/41598_2023_48681_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/357b44b39255/41598_2023_48681_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/1094b88a8ae1/41598_2023_48681_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/53c5bbda18b5/41598_2023_48681_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/ff85f8b65adf/41598_2023_48681_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/a2c34ea4c1ea/41598_2023_48681_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/aa6c94dcbc9e/41598_2023_48681_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2910/10703784/107dca62161e/41598_2023_48681_Fig7_HTML.jpg

相似文献

1
A comparative analysis of using ensemble trees for botnet detection and classification in IoT.物联网中使用集成树进行僵尸网络检测和分类的比较分析。
Sci Rep. 2023 Dec 7;13(1):21632. doi: 10.1038/s41598-023-48681-6.
2
An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.基于聚合互信息的特征选择与机器学习方法在增强物联网僵尸网络攻击检测中的应用。
Sensors (Basel). 2021 Dec 28;22(1):185. doi: 10.3390/s22010185.
3
IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection.基于优化极端梯度提升和特征选择的物联网僵尸网络攻击检测。
Sensors (Basel). 2020 Nov 6;20(21):6336. doi: 10.3390/s20216336.
4
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.基于机器学习的物联网僵尸网络攻击检测的序列架构。
Sensors (Basel). 2020 Aug 5;20(16):4372. doi: 10.3390/s20164372.
5
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
6
Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet.基于交叉深度学习的物联网僵尸网络传播检测方法
Sensors (Basel). 2022 May 20;22(10):3895. doi: 10.3390/s22103895.
7
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.增强集成机器学习的物联网系统网络攻击检测高效技术:BoostedEnML
Sensors (Basel). 2022 Sep 29;22(19):7409. doi: 10.3390/s22197409.
8
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.基于集成特征选择和深度学习模型的物联网网络攻击检测方法
Sensors (Basel). 2023 Aug 23;23(17):7342. doi: 10.3390/s23177342.
9
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.基于蜜罐与机器学习的物联网智能工厂中僵尸网络攻击分类
PeerJ Comput Sci. 2021 Jan 25;7:e350. doi: 10.7717/peerj-cs.350. eCollection 2021.
10
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.

引用本文的文献

1
Leveraging blockchain for cybersecurity detection using hybridization of prairie dog optimization with differential evolution on internet of things environment.在物联网环境中,利用草原犬优化算法与差分进化算法的混合方法,借助区块链进行网络安全检测。
Sci Rep. 2025 Aug 28;15(1):31673. doi: 10.1038/s41598-025-10410-6.
2
An entropy and machine learning based approach for DDoS attacks detection in software defined networks.一种基于熵和机器学习的软件定义网络中分布式拒绝服务攻击检测方法。
Sci Rep. 2024 Aug 6;14(1):18159. doi: 10.1038/s41598-024-67984-w.

本文引用的文献

1
An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network.一种基于群体神经网络的安全物联网医疗框架入侵检测机制。
IEEE J Biomed Health Inform. 2022 May;26(5):1969-1976. doi: 10.1109/JBHI.2021.3101686. Epub 2022 May 5.
2
IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection.基于优化极端梯度提升和特征选择的物联网僵尸网络攻击检测。
Sensors (Basel). 2020 Nov 6;20(21):6336. doi: 10.3390/s20216336.