Machine Learning Method For Detecting Botnet Attacks Originated From The IoT Networks

dc.contributor.advisorBahsi, Hayretdin, juhendaja
dc.contributor.advisorNõmm, Sven, juhendaja
dc.contributor.advisorMatulevicius, Raimundas, juhendaja
dc.contributor.authorAbylkassymova, Anel
dc.contributor.otherTartu Ülikool. Loodus- ja täppisteaduste valdkondet
dc.contributor.otherTartu Ülikool. Arvutiteaduse instituutet
dc.date.accessioned2023-08-31T11:21:17Z
dc.date.available2023-08-31T11:21:17Z
dc.date.issued2022
dc.description.abstractRecently, botnet attacks have become more sophisticated than other malware since they can expand to other devices and cause even more damage. The botnet attacks are large-scale attacks that can compromise IoT devices due to their lack of security measures. An intrusion detection system (IDS) is used to monitor the network traffic and capture the suspicious traffic. The IDS, based on the machine learning approach, has been more utilized by security analysts for IoT botnet detection. This approach applies a machine learning model to enhance the IoT botnet detection process. The botnet attack development causes the demand to improve the botnet detection workflow. The botnet attacks are multi-stage attacks that harm systems gradually. Thereby, there is a need for early stages of attack detection to prevent malware from expanding. Although some machine learning-based research papers focused only on malware detection, those papers did not consider the structure of IoT botnet attacks, which can also include a multi-stage attack approach. Also, there is a problem with the IoT device type identification. The compromised IoT devices in the IoT environment should be defined to prevent the spread of malware. Thereby, this thesis is intended to improve the malware detection procedure utilizing different machine learning methods that not only address binary classification problems but also can be applied in early attack stages detection with a categorization of malware with device type and attack stage with the device type. The binary classification models defined the IoT botnet malware such as Mirai, Bashlite, and Torii. The multiclass classification models included: 4 classes of scenarios with three malware types and legitimate traffic, 8 classes of an experiment that differentiated the malware type and device type, and 12 classes of scenarios that distinguished the attack stage, whether it was command and control (C&C) or spread and the device type.et
dc.identifier.urihttps://hdl.handle.net/10062/91906
dc.language.isoenget
dc.publisherTartu Ülikoolet
dc.rightsopenAccesset
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectIoTet
dc.subjectBotnetet
dc.subjectMachine learninget
dc.subjectSupervised learninget
dc.subject.othermagistritöödet
dc.subject.otherinformaatikaet
dc.subject.otherinfotehnoloogiaet
dc.subject.otherinformaticset
dc.subject.otherinfotechnologyet
dc.titleMachine Learning Method For Detecting Botnet Attacks Originated From The IoT Networkset
dc.typeThesiset

Failid

Originaal pakett

Nüüd näidatakse 1 - 1 1
Laen...
Pisipilt
Nimi:
Abylkassymova_cybersec_2022.pdf
Suurus:
1.66 MB
Formaat:
Adobe Portable Document Format
Kirjeldus:

Litsentsi pakett

Nüüd näidatakse 1 - 1 1
Laen...
Pisipilt
Nimi:
license.txt
Suurus:
1.71 KB
Formaat:
Item-specific license agreed upon to submission
Kirjeldus: