Predicting IoT Botnet Attacks for Enhanced Data Transmission Security in the Cloud Using Variational Autoencoders
Keywords:
Data Transmission, Security Threat Prediction, Variational Autoencoders (VAEs), IoT Security, Cloud Computing, IoT Botnet AttacksAbstract
In the expansive domain of the Internet of Things (IoT), ensuring the integrity of data transmission within cloud computing systems takes precedence as a critical concern. This research focuses on proactively identifying and mitigating IoT security threats, particularly botnet attacks, using advanced Variational Autoencoders (VAEs) with the UNSW-NB15 dataset. The model achieved an impressive accuracy of 99.74%, highlighting its effectiveness in predicting IoT botnet attacks. Through rigorous evaluation and comparative analysis, the study establishes the superiority of the VAE-based model. Beyond immediate applications, the model has transformative potential for enhancing data transmission security in IoT and cloud computing. This research paves the way for groundbreaking advancements, envisioning a future where information flows securely in the interconnected global landscape, ensuring a safer and more resilient digital environment in the era of IoT.
Downloads
References
R. Daws, ‘Asimily Report Highlights Threats to Connected Healthcare Devices.’ Internet of Things News. IoT Tech News, August 23, 2023. Available at: https://www.iottechnews.com/news/2023/aug/23/asimily-report-threats-connected-healthcare-devices/.
R. Daws, “‘Enterprises Accelerate IoT Deployments to Drive Digital Transformation.’ Internet of things news. IoT tech News, August 15, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/15/enterprises-accelerate-iot-deployments-digital-transformation/.
R. Daws, “‘Qiang Huang, Palo Alto Networks: On Addressing IoT Device Security Challenges.’ Internet of things news. IoT tech News, August 16, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/16/qiang-huang-palo-alto-networks-iot-device-security-challenges/.
R. Daws, “‘Kaleido Intelligence Forecasts ESIM Adoption Surge for IoT.’ Internet of things news. IoT tech News, August 21, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/21/kaleido-intelligence-forecasts-esim-adoption-surge-iot/.
R. Daws, “‘Z-Wave Alliance Celebrates Trident IoT’s Launch.’ Internet of things news. IoT tech News, August 17, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/17/z-wave-alliance-celebrates-trident-iot-launch/.
B. Bojarajulu et al., “Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model,” Comput. Sec., vol. 126, no. 103064 (2023), p. 103064, Mar.2023.
S. Khanam et al., “Towards an effective intrusion detection model using focal loss variational AutoEncoder for Internet of things (IoT),” Sensors (Basel, Switzerland), vol. 22, no. 15, p. 5822, Aug. 2022.
V. Gugueoth et al., “Security of Internet of things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects,” ICT Express, vol. 9, no. 5, pp. 941-960, Oct. 2023.
H. Lin et al., “Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine,” Digit. Commun. Netw., vol. 9, no. 1, pp. 111-124, Feb. 2023.
Q. Abu Al-Haija and M. Al-Dala’ien, “ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks,” J. Sens. Actuator Netw., vol. 11, no. 1, p. 18, Mar. 2022.
L. Tan et al., “A new framework for DDoS attack detection and defense in SDN environment,” IEEE Access Pract. Innov. Open Solut., vol. 8, pp. 161908-161919, Sep.2020.
O. Jullian et al., “Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework,” J. Netw. Syst. Manag., vol. 31, no. 2, Feb. 2023.
S. Garg et al., “A hybrid deep learning-based model for anomaly detection in cloud datacenter networks,” IEEE Trans. Netw. Serv. Manage., vol. 16, no. 3, pp. 924-935, Jul.2019.
A. A. Nancy et al., “IoT-cloud-based smart healthcare monitoring system for heart disease prediction via deep learning,” Electronics, vol. 11, no. 15, p. 2292, Jul. 2022.
V. Gugueoth et al., “Security of Internet of things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects,” ICT Express, vol. 9, no. 5, pp. 941-960, Oct. 2023.
B. Kolosnjaji et al., “Deep learning for classification of malware system call sequences” in AI 2016, Adv. Artif. Intell. Cham: Springer International Publishing, pp. 137-149, Nov.2016.
D. Ingle and D. Ingle, “An enhanced blockchain based security and attack detection using transformer in IOT-cloud network,” ARASET, vol. 31, no. 2, pp. 142-156, Jul.2023
V. A. Devi et al., “Reliable and secure data transfer in IoT networks using knight-tour and PHLSB method,” ARASET, vol. 32, no. 2, pp. 107-118, Oct. 2023.
“UNSW_NB15,” Kaggle: Your Machine Learning and Data Science Community. Available at: https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15.
A. Asperti and M. Trentin, “Balancing reconstruction error and Kullback–Leibler divergence in variational autoencoders,” IEEE Access Pract. Innov. Open Solut., vol. 8, pp. 199440-199448, Oct. 2020.
“Kullback–Leibler divergence,” Wikipedia, The Free Encyclopedia. last modified September 18, 2023 https://en.wikipedia.org/w/index.php?title=Kullback%E2%80%93Leibler_divergence&oldid=1175951168.
“Deriving the KL divergence loss for VAEs,” Cross Validated. Available at: https://stats.stackexchange.com/questions/318748/deriving-the-kl-divergence-loss-for-vaes.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.