Open Access
ARTICLE
Mirai Botnet Attack Detection in Low-Scale Network Traffic
Department of Computer Engineering, Istanbul University-Cerrahpasa, Istanbul, Turkey
* Corresponding Author: Zeynep GÜRKAŞ-AYDIN. Email:
Intelligent Automation & Soft Computing 2023, 37(1), 419-437. https://doi.org/10.32604/iasc.2023.038043
Received 24 November 2022; Accepted 16 January 2023; Issue published 29 April 2023
Abstract
The Internet of Things (IoT) has aided in the development of new products and services. Due to the heterogeneity of IoT items and networks, traditional techniques cannot identify network risks. Rule-based solutions make it challenging to secure and manage IoT devices and services due to their diversity. While the use of artificial intelligence eliminates the need to define rules, the training and retraining processes require additional processing power. This study proposes a methodology for analyzing constrained devices in IoT environments. We examined the relationship between different sized samples from the Kitsune dataset to simulate the Mirai attack on IoT devices. The training and retraining stages for the Mirai attack were also evaluated for accuracy. Various approaches are evaluated in smaller sample sizes to minimize training time on low-resource devices. Cross-validation was used to avoid overfitting classification methods during the learning process. We used the Bootstrapping technique to generate 1000, 10000, and 100000 samples to examine the performance metrics of different-sized variations of the dataset. In this study, we demonstrated that a sample size of 10000 is sufficient for 99,56% accuracy and learning in the detection of Mirai attacks in IoT devices.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.