Implementation of threats detection modeling with Deep learning in IoT botnet attack environment

Authors: Pandey, H., Sangher, K.S., Singh, A. and Kalyani, L.

Conference: International Conference on Information and Communication Technology for Intelligent Systems

Dates: 25-26 March 2022

DOI: 10.1007/978-981-19-3575-6_57

Abstract:

IoT forensics where security and privacy are the key concern as the data the majorly hold personal information. So how to work on the vulnerabilities available from the IoT environment and classify them to get the best results to perform the forensics is covered in the paper. In IoT forensics botnet dataset analysed using deep learning classification to get the understanding that how deep learning can be used effectively for forensic analysis. So, research work provides advanced digital forensics methods i.e., collection of evidence and analysis of dataset for IoT forensics implementation. Since a decade ago, we are seeing a reality where hacking into a client's PC utilizing small bots or blocking a gathering of interconnected gadgets is not any more unthinkable. These little bots are called botnets (e.g., Mirai, Torii and so on.), which are a gathering of deadly codes that can obstruct the whole security. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are helpless to penetrate as one influenced gadget can crumple the entire system. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are defenseless to break as one influenced gadget can hamper the entire system. The security danger stays as botnet assaults increment their essence to the interconnected gadgets. In this work, we are proposing a novel correlation between AI (SVM and KNN) and profound learning draws near (Neural system) to discover which approach creates better outcome while learning the assault designs. Research explores the IoT forensics analysis. In IoT forensics models were applied on a composite information storehouse which was made by consolidating the outcomes found from the examination we did on Torii botnet test, with the CTU-13 dataset of botnet assaults on IoT environment.

https://eprints.bournemouth.ac.uk/37802/

Source: Manual

Implementation of threats detection modeling with Deep learning in IoT botnet attack environment

Authors: Sangher, K.S., Singh, A., Pandey, H. and Kalyani, L.

Conference: International Conference on Information and Communication Technology for Intelligent Systems

Pages: 585-592

Publisher: Springer

ISBN: 9789811935749

Abstract:

IoT forensics where security and privacy are the key concern as the data the majorly hold personal information. So how to work on the vulnerabilities available from the IoT environment and classify them to get the best results to perform the forensics is covered in the paper. In IoT forensics botnet dataset analysed using deep learning classification to get the understanding that how deep learning can be used effectively for forensic analysis. So, research work provides advanced digital forensics methods i.e., collection of evidence and analysis of dataset for IoT forensics implementation. Since a decade ago, we are seeing a reality where hacking into a client's PC utilizing small bots or blocking a gathering of interconnected gadgets is not any more unthinkable. These little bots are called botnets (e.g., Mirai, Torii and so on.), which are a gathering of deadly codes that can obstruct the whole security. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are helpless to penetrate as one influenced gadget can crumple the entire system. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are defenseless to break as one influenced gadget can hamper the entire system. The security danger stays as botnet assaults increment their essence to the interconnected gadgets. In this work, we are proposing a novel correlation between AI (SVM and KNN) and profound learning draws near (Neural system) to discover which approach creates better outcome while learning the assault designs. Research explores the IoT forensics analysis. In IoT forensics models were applied on a composite information storehouse which was made by consolidating the outcomes found from the examination we did on Torii botnet test, with the CTU-13 dataset of botnet assaults on IoT environment.

https://eprints.bournemouth.ac.uk/37802/

Source: BURO EPrints