Skip to main content

Implementation of threats detection modeling with Deep learning in IoT botnet attack environment.

Sangher, K. S., Singh, A., Pandey, H. and Kalyani, L., 2022. Implementation of threats detection modeling with Deep learning in IoT botnet attack environment. In: International Conference on Information and Communication Technology for Intelligent Systems, 25-26 March 2022, Ahmedabad, India, 585-592.

Full text available as:

[img]
Preview
PDF
Paper-252.pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial.

398kB

DOI: 10.1007/978-981-19-3575-6_57

Abstract

IoT forensics where security and privacy are the key concern as the data the majorly hold personal information. So how to work on the vulnerabilities available from the IoT environment and classify them to get the best results to perform the forensics is covered in the paper. In IoT forensics botnet dataset analysed using deep learning classification to get the understanding that how deep learning can be used effectively for forensic analysis. So, research work provides advanced digital forensics methods i.e., collection of evidence and analysis of dataset for IoT forensics implementation. Since a decade ago, we are seeing a reality where hacking into a client's PC utilizing small bots or blocking a gathering of interconnected gadgets is not any more unthinkable. These little bots are called botnets (e.g., Mirai, Torii and so on.), which are a gathering of deadly codes that can obstruct the whole security. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are helpless to penetrate as one influenced gadget can crumple the entire system. As Internet of Things (IoT) is developing quickly, the interconnected gadgets are defenseless to break as one influenced gadget can hamper the entire system. The security danger stays as botnet assaults increment their essence to the interconnected gadgets. In this work, we are proposing a novel correlation between AI (SVM and KNN) and profound learning draws near (Neural system) to discover which approach creates better outcome while learning the assault designs. Research explores the IoT forensics analysis. In IoT forensics models were applied on a composite information storehouse which was made by consolidating the outcomes found from the examination we did on Torii botnet test, with the CTU-13 dataset of botnet assaults on IoT environment.

Item Type:Conference or Workshop Item (Paper)
Uncontrolled Keywords:Network forensics; deep learning; cyber threat intelligence; botnets; DeBot; interference problem; Internet of Things (IoT)
Group:Faculty of Science & Technology
ID Code:37802
Deposited By: Symplectic RT2
Deposited On:12 Dec 2022 16:39
Last Modified:12 Dec 2022 16:39

Downloads

Downloads per month over past year

More statistics for this item...
Repository Staff Only -