Skip to main content
Log in

Joined Bi-model RNN with spatial attention and GAN based IoT botnet attacks detection

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

Currently, for many purposes machine and deep learning methods are utilized to identify botnet threats in IoT networks. On the other hand, highly imbalanced network traffic information in the training set frequently humiliates the classification. A novel method is proposed called Joined Bi-Model RNN with Spatial Attention (JBiRSA). This work will be a pathway for many artificial intelligence researchers in cyber security. The introduced Joint Bi model of LSTM and GRU is combined with the local information gathering data as an added mode. The distinguished traffic flow features are fine-tuned with spatial attention. In this work, in order to solve the data class imbalance a GAN model is proposed with multi kernel De-Convolution with three level of skip connection. In this model GAN with Traffic Encoder loss is proposed along with an effective generator especially suited for network traffic. Two data sets are used, namely N-BaIoT and IoT-23. N-BaIoT data set is formed by adding botnet attacks such as Bashlite and Mirai. IoT-23 data set is formed with 20 malware confines from various IoT devices and 3 precincts for benign anomalies. JBiRSA with GAN has proven to be efficient and has the potential to differentiate between benign and malicious traffic data in IoT attacks. JBiRSA with GAN provides an overall accuracy of 98.75%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14
Figure 15
Figure 16
Figure 17
Figure 18
Figure 19
Figure 20

Similar content being viewed by others

Data Availability

IoT-23 data set which was given by the Avast AIC laboratory [12] was used in this work.

References

  1. Aceto, Persico and Pescape 2019 A survey on information and communication technologies for Industry 4.0: state-of-the-art, taxonomies, perspectives, and challenges. IEEE Commun. Survet Tutor. 21: 3467–3501

    Article  Google Scholar 

  2. Kim J, Shim M, Hong S, Shin Y and Choi E 2020 Intelligent Detection of IoT Botnets using machine learning and deep learning. Appl. Sci. Vol. 10 :7009.

  3. Gartner Top 10 Strategic Technology Trends for 2020. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for2020

  4. Ahmed A A, Jabbar W A, SafaaSadiq A and Patel H 2020 Deep learning-based classification model for botnet attack detection. Springer, J. Ambient Intell. Humaniz. Comput., Vol. 13

  5. Popoola S I, Adebisi B, Ande R, Hammoudeh M and Atayero A A 2021 Memory-efficient deep learning for botnet attack detection in IoT networks. Electronics 10: 1104

    Article  Google Scholar 

  6. Ferdowsi A and Saad W 2020 Generative adversarial networks for distributed intrusion detection in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM)

  7. Albulayhi K, Smadi A A, Sheldon F T and Abercrombie R K 2021 IoT intrusion detection taxonomy, reference architecture, and analyses. Sensors (Basel) 21(19): 6432

    Article  Google Scholar 

  8. Randhawa R, Aslam N, Alauthman M, Rafiq H and Comeau F 2021 Security hardening of botnet detectors using generative adversarial networks. IEEE Access 9: 78276–78292

    Article  Google Scholar 

  9. Alauthman, Aslam, Al-Kasassbeh, Khan, Al-Qerem and Choo K K R 2020, “An efficient reinforcement learning-based botnet detection approach. J. Netw. Comput. Appl. 150, Article no 102479

  10. Ramasamy L and Seifedine K 2021. Internet of things (IoT).https://doi.org/10.1088/978-0-7503-3663-5ch1

  11. Skarmeta A, Hernández-Ramos J and Bernabe J B 2015 A required security and privacy framework for smart objects. https://doi.org/10.1109/Kaleidoscope.2015.7383648

  12. Ray P P 2018 A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inform. Sci. 30(3): 291–319

    Google Scholar 

  13. Palla T G and Tayeb S 2021 Intelligent Mirai malware detection for IoT nodes. Electronics 10: 1241.

    Article  Google Scholar 

  14. Azmoodeh, Dehghantanha, Conti and Choo 2018 Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9: 1141–1152

    Article  Google Scholar 

  15. Haddad Pajouh, Dehghantanha, Khayami and Choo A 2018 A deep recurrent neural network based approach for internet of things malware threat hunting. Future Gen. Comput. Syst. 85: 88–96

    Article  Google Scholar 

  16. Hodo, Bellekens, Hamilton, Dubouilh, Iorkyase, Tachtatzis and Atkinson 2016 Threat analysisof IoT networks using artificial neural network intrusion detection system. In: Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), YasmineHammamet, Tunisia, pp. 1–6

  17. Bastos, Marzano, Fonseca, Fazzion, Hoepers, Steding-Jessen, Chaves, Cunha, Guedes and Meira 2019 Identifying and characterizing bashlite and mirai C&C servers. In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, pp. 1–6

  18. Xie, Wu, Liu and Li 2017 IoT data analytics using deep learning. arXiv 2017, arXiv:1708.03854

  19. Alam, Mehmood, Katib and Albeshri 2016 Analysis of eight data mining algorithms for smarter internet of things (IoT). Procedia Comput. Sci. 98: 437–442

    Article  Google Scholar 

  20. Ullah I and Mahmoud Q H 2021 Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9: 103906–103926

    Article  Google Scholar 

  21. Papernot, McDaniel, Goodfellow, Jha, Celik and Swami 2017 Practical black-box attacks against machine learning. In: Proceedings of ACMAsia Conference Computing Communication Security, pp. 506–519

  22. Yavuz, Devrim and Ensar 2018 Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 12: 39–58

    Article  Google Scholar 

  23. Sriram S, Vinayakumar R, Alazab M, and Soman K P 2020 Network flow based IoT botnet attack detection using deep learning. In: Proceedings of IEEE INFOCOM Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.189–194. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162668

  24. Yin C, Zhang S, Wang J and Xiong N N 2020 Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans. Syst. Man Cybern. Syst. Early. https://doi.org/10.1109/tsmc.2020.2968516

    Article  Google Scholar 

  25. Popoola S I, BamideleAdebisi R A, Hammoudeh M, Anoh K and Atayero A A 2021 SMOTE-DRNN: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21: 2985

    Article  Google Scholar 

  26. Yin C, Zhu Y, Liu S, Fei J and Zhang H 2018 An enhancing framework for botnet detection using generative adversarial networks. In: IEEE, International conference on Artificial Intelligence and Big Data

  27. Meidan, Bohadana, Mathov, Mirsky, Shabtai, Breitenbacher and Elovici 2018 Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17: 12–22

    Article  Google Scholar 

  28. Al Shorman, Faris and Aljarah 2020 Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J. Ambient Intell. Humaniz. Comput. 11: 2809–2825

    Article  Google Scholar 

  29. Mcdermott C D, Majdani F and Petrovski A V 2018 Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the International Joint Conference on Neural Networks 2018 (IJCNN 2018), 8–13 July 2018, Rio de Janeiro, Brazil. Piscataway: IEEE [online], article ID 8489489

  30. Shaikh F, Ghani N and Bou-Harb E 2019 IoT threat detection leveraging network statistics and GAN

  31. Lan L, You L, Zhang Z, Fan Z, Zhao W, Zeng N, Chen Y and Zhou X 2020 Generative adversarial networks and its applications in biomedical informatics. Front Public Health 8(164). https://doi.org/10.3389/fpubh.2020.00164

  32. Agarap A F M 2019 Deep learning using rectified linear units (ReLU)”, arXiv:1803.08375v2

  33. Yu F and Koltun V 2016 Multi-scale context aggregation by dilated convolutions. In Published as a conference paper at ICLR 2016

  34. Wang Z and Ji S 2021, “Smoothed Dilated Convolutions for Improved Dense Prediction”, Data Mining and Knowledge Discovery, Vol.35, pp.1470–1496

  35. Li Y, Zhang X and Chen D 2018 CSRNet: dilated convolutional neural networks for understanding the highly congested scenes. In: IEEE CVPR 2018

  36. Chollet F 2017 Xception: deep learning with depthwise separable convolutions. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1800–1807.

  37. Lin M, Chen Q and Yan S 2013,“Network In Network”, Neural and Evolutionary Computing (cs.NE); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

  38. Kim H and Jeong Y-S 2019 Sentiment classification using convolutional neural networks. Appl. Sci 9: 2347

    Article  Google Scholar 

  39. Josephine V H, Nirmala A P and Alluri V L 2021 Impact of hidden dense layers in convolutional neural network to enhance performance of classification model. In: ICETCE 2021, IOP Conference Series: Materials Science and Engineering, 1131

  40. Ghosh S, Das N and Nasipuri M 2019 Reshaping inputs for convolutional neural networks -some common and uncommon methods. Pattern Recogn. 93(10). pp. 79–94

  41. Mary N A B and Dharma D 2018 Coral reef image/video classification employing novel octa-angled pattern for triangular sub region and pulse coupled convolutional neural network (PCCNN). Multimedia Tools Appl 77: 31545–31579

    Article  Google Scholar 

  42. Mary N A B, Merryton N A R and Grace D S R 2021 BANANA leaves diseases classification using DPVP and PCCNN. In: International Virtual Conference on Recent Trends and Techniques in Mathematical and Computer Science

  43. Mary N A B, Singh A R and Athisayamani S 2020 Banana leaf diseased image classification using novel HEAP auto encoder (HAE) deep learning. Multimedia Tools and Applications 79: 30601–30613

    Article  Google Scholar 

  44. Mechrez R, Talmi I and Zelnik-Manor L 2018 The contextual loss for image transformation with non-aligned data. In: ECCV

  45. Lynn H M, Pan S B and Kim P 2019 A deep bidirectional GRU network model for biometric electrocardiogram classification based on recurrent neural networks. IEEE Access 7: 145395–145405

    Article  Google Scholar 

  46. Cho K, van Merrienboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv:1406.1078

  47. "Recurrent Neural Network Tutorial, Part 4 – Implementing a GRU/LSTM RNN with Python and Theano – WildML". Wildml.com. 2015-10-27. Retrieved May 18, 2016

  48. Gruber N and Jockisch A 2020 Are GRU cells more specific and LSTM cells more sensitive in motive classification of text? Front. Artif. Intell. 3: 40. https://doi.org/10.3389/frai.2020.00040

    Article  Google Scholar 

  49. Yin X, Liu C and Fang X 2020 Sentiment analysis based on BiGRU information enhancement. In ISCME 2020 Journal of Physics: Conference Series

  50. Rahman M M, Watanobe Y and Nakamura K 2021 A bidirectional LSTM language model for code evaluation and repair. Symmetry 13: 247

    Article  Google Scholar 

  51. Woo S, Park J, Lee J-Y and Kweon I S 2018 CBAM: convolutional block attention module. arXiv.org >cs> arXiv:1807.06521v2

  52. Josephine V H, Nirmala A P and Alluri V L 2021 Impact of hidden dense layers in convolutional neural network to enhance performance of classification model. In: ICETCE 2021, IOP Conference Series: Materials Science and Engineering, Vol. 1131

  53. Parmisano A, Garcia S M. J. E 2018 IoT-23 Dataset: A labeled dataset of malware and benign IoT traffic. — Stratosphere IPS

  54. N. Ani Brown Mary and Dejey Dharma, 2019, “A novel framework for real-time diseased coral reef image classification”, Springer, Multimedia Tools and Applications,vol.78, pp.11387–11425.

  55. K. Jayapriya and N. Ani Brown Mary, 2019, “Employing a novel 2-gram subgroup intra pattern (2GSIP) with stacked auto encoder for membrane protein classification”, Springer, Molecular Biology Reports, vol.46, pp. 2259–2272

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S Senthil.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Senthil, S., Muthukumaran, N. Joined Bi-model RNN with spatial attention and GAN based IoT botnet attacks detection. Sādhanā 48, 141 (2023). https://doi.org/10.1007/s12046-023-02188-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12046-023-02188-y

Keywords

Navigation