Analysis of IoT Botnets using Machine Learning Technique
Abstract
Abstract— Internet of Things (IoT) botnets have been used to bring down some of the biggest services on the Internet. The spread of Internet of Things (IoT) botnets like those utilizing the Mirai malware was successful enough to the most powerful DDoS attacks. Particularly, behavioral-based approaches suffer from the unavailability of the benchmark datasets and this lead to lack of precise results evaluation of botnet detection systems, comparison, and deployment which originates from the deficiency of adequate datasets. This project used machine learning as an algorithms program that learn to collect data. There are various data mining tools available to analyze data related IoT botnets detection. However, the problem arises in deciding the most appropriate machine learning techniques or algorithm on particular tools to be implemented on IoT botnet data. This research is focusing only on classification techniques. Hence, the objective of this research is to identify the best machine learning technique or algorithm on selected tool for IoT botnets detection. Five techniques: Random Forest, J48, JRip, Naïve Bayes and BayesNet. are selected and applied in selected tools namely Weka. The expected output of this project is to provide the machine learning techniques for effective detection of IoT botnets flows that have high predictive accuracy. This result provides an option for the researcher on applying technique or algorithm on selected tool when analyzing IoT botnets data.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a copyright form (JACTA) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).