Issue |
ITM Web Conf.
Volume 63, 2024
1st International Conference on Advances in Machine Intelligence, and Cybersecurity Technologies (AMICT2023)
|
|
---|---|---|
Article Number | 01019 | |
Number of page(s) | 13 | |
DOI | https://doi.org/10.1051/itmconf/20246301019 | |
Published online | 13 February 2024 |
Detection of Botnet in the loT Network
1
FAST School of Computing, National University of Computer and Emerging Sciences,
Karachi
75030,
Pakistan
2
Faculty of Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS,
Kota Kinabalu
88400,
Sabah,
Malaysia
3
Cyber Security Research Lab, Faculty of Computing and Informatics, Universiti Malaysia Sabah, Jalan UMS,
Kota Kinabalu
88400,
Sabah,
Malaysia
4
School of Engineering Technology and Applied Science, Centennial College,
Toronto,
Ontario,
Canada
5
Faculty of Islamic Technology, University Islam Sultan Sharif Ali,
Brunei
Darussalam
* Corresponding author: shjamil@ums.edu.my
The ubiquity of Internet of Things (IoT) devices has prompted security concerns, particularly in the face of evolving botnet attacks. This paper investigates the impact of botnet attacks on IoT devices and proposes a network-based detection and prevention system employing signature and anomaly-based mechanisms. Notably, our methodology extends beyond traditional detection, focusing on proactively impeding bot creation. Leveraging a Linux-based distributed system, Security Information and Event Management (SIEM) tools, and custom rules, our approach encompasses distinct phases Preprocessing, Network Security Monitoring, Rule-based IDS System, and Analysis. Experimental results with diverse PCAP files demonstrate the efficacy of custom rules, significantly enhancing alert counts for various security aspects, including network trojan detection and privacy violations. The significant finding is the substantial increase in alert counts after the integration of custom rules, exemplified in the 1.1 GB PCAP file scenario. Network trojan detection surged from 585 to 988, emphasizing the heightened efficacy of rule-based measures. Privacy breaches and bad traffic alerts also experienced significant increments, showcasing the system’s improved sensitivity and responsiveness. This finding reinforces the pivotal role of custom rules in fortifying IoT network security comprehensively.
© The Authors, published by EDP Sciences, 2024
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.