An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method

نویسندگان

چکیده

Nowadays, the rapid growth of technology delivers many new concepts and notations that aim to increase efficiency comfort human life. One these techniques is Internet Things (IoT). The IoT has been used achieve efficient operation management, cost-effective operations, better business opportunities, etc. However, there are challenges facing implementing an smart environment. most critical challenge protecting environment from different attacks. Botnet attacks considered a serious challenge. danger this attack lies in it could be for several threatening commands. Therefore, implemented perform DDoS attacks, phishing spamming, other scenarios. This paper introduced detection approach against using interpolation reasoning method. suggested was method instead classical methods handle knowledge base issues reduce size fuzzy rules. designed, tested, evaluated open-source benchmark dataset. experiments show able detect effectively with 96.4% rate. Furthermore, obtained results were compared literature results; accomplished comparison showed rivalry methods, reduced false positive rate interpolated alerts even case sparse rule base.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

An Approach for Accurate Edging using Dynamic Membership Functions

In this paper, by means of fuzzy approaches, an accurate method is introduced for edging of color photographs. The difference between our method with other similar methods is the use of a morphological operation to think or thick the obtained edges. In this proposed method, a 3×3 window is dragged on the photo. For each block, 12 point sets will be defined, each including two non-overlapping po...

متن کامل

Honeypot detection in advanced botnet attacks

Botnets have become one of the major attacks in current Internet due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defense systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviors, they are widely used by security d...

متن کامل

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection

This report mainly discusses the adaptability of the IRC-based Bot detection method to be used in the P2P-based Bot detection. The first section introduces the IRC-based bot and the newly appeared P2P-based bot to see their difference. The second section shows the related work and the traditional method of BOTNET detection. The third section discusses the methodology used by the IRC based Botne...

متن کامل

Machine Learning Approach for Botnet Detection

BotNet is a type of malware that has posed serious threats to Internet community and has been a common weapon for committing cybercrimes such as spam generation, stealing sensitive information, click fraud and DDOS attacks. In this document, we propose an approach for BotNet detection at large scale where network traffic is monitored at a central core in the Internet (say a Tier-1 ISP) so that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2022

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info13060300