Predicting IoT Botnet Attacks for Enhanced Data Transmission Security in the Cloud Using Variational Autoencoders

Authors

  • Chandrasekar Venkatachalam Professor, Department of CSE, Faculty of Engineering and Technology, Jain (Deemed-to-be) University, Bangalore, Karnataka
  • P. Selvaraju Associate Professor, Department of Computer Science and Engineering, Excel Engineering College, Namakkal, Tamilnadu
  • Tamil Selvan Sivalingam Assistant Professor & Head, Department of Computer Science and Design, Erode Sengunthar Engineering College, Thudupathi, Perundurai, Erode – 638057
  • V. Rajakumareswaran Assistant Professor, Dept of Computer Science and Design, Erode Sengunthar Engineering College, Erode - Tamilnadu, India, 638057
  • K. Mohanambal Assistant Professor l (Level l), Bannariamman Institute of Technology, Sathyamangalam, Tamilnadu, 638401
  • M. Murali Assistant Professor, Department of IT, Sona College of Technology, Salem, Tamilnadu, 636005

Keywords:

Data Transmission, Security Threat Prediction, Variational Autoencoders (VAEs), IoT Security, Cloud Computing, IoT Botnet Attacks

Abstract

In the expansive domain of the Internet of Things (IoT), ensuring the integrity of data transmission within cloud computing systems takes precedence as a critical concern. This research focuses on proactively identifying and mitigating IoT security threats, particularly botnet attacks, using advanced Variational Autoencoders (VAEs) with the UNSW-NB15 dataset. The model achieved an impressive accuracy of 99.74%, highlighting its effectiveness in predicting IoT botnet attacks. Through rigorous evaluation and comparative analysis, the study establishes the superiority of the VAE-based model. Beyond immediate applications, the model has transformative potential for enhancing data transmission security in IoT and cloud computing. This research paves the way for groundbreaking advancements, envisioning a future where information flows securely in the interconnected global landscape, ensuring a safer and more resilient digital environment in the era of IoT.

Downloads

Download data is not yet available.

References

R. Daws, ‘Asimily Report Highlights Threats to Connected Healthcare Devices.’ Internet of Things News. IoT Tech News, August 23, 2023. Available at: https://www.iottechnews.com/news/2023/aug/23/asimily-report-threats-connected-healthcare-devices/.

R. Daws, “‘Enterprises Accelerate IoT Deployments to Drive Digital Transformation.’ Internet of things news. IoT tech News, August 15, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/15/enterprises-accelerate-iot-deployments-digital-transformation/.

R. Daws, “‘Qiang Huang, Palo Alto Networks: On Addressing IoT Device Security Challenges.’ Internet of things news. IoT tech News, August 16, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/16/qiang-huang-palo-alto-networks-iot-device-security-challenges/.

R. Daws, “‘Kaleido Intelligence Forecasts ESIM Adoption Surge for IoT.’ Internet of things news. IoT tech News, August 21, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/21/kaleido-intelligence-forecasts-esim-adoption-surge-iot/.

R. Daws, “‘Z-Wave Alliance Celebrates Trident IoT’s Launch.’ Internet of things news. IoT tech News, August 17, 2023”. Available at: https://www.iottechnews.com/news/2023/aug/17/z-wave-alliance-celebrates-trident-iot-launch/.

B. Bojarajulu et al., “Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model,” Comput. Sec., vol. 126, no. 103064 (2023), p. 103064, Mar.2023.

S. Khanam et al., “Towards an effective intrusion detection model using focal loss variational AutoEncoder for Internet of things (IoT),” Sensors (Basel, Switzerland), vol. 22, no. 15, p. 5822, Aug. 2022.

V. Gugueoth et al., “Security of Internet of things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects,” ICT Express, vol. 9, no. 5, pp. 941-960, Oct. 2023.

H. Lin et al., “Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine,” Digit. Commun. Netw., vol. 9, no. 1, pp. 111-124, Feb. 2023.

Q. Abu Al-Haija and M. Al-Dala’ien, “ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks,” J. Sens. Actuator Netw., vol. 11, no. 1, p. 18, Mar. 2022.

L. Tan et al., “A new framework for DDoS attack detection and defense in SDN environment,” IEEE Access Pract. Innov. Open Solut., vol. 8, pp. 161908-161919, Sep.2020.

O. Jullian et al., “Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework,” J. Netw. Syst. Manag., vol. 31, no. 2, Feb. 2023.

S. Garg et al., “A hybrid deep learning-based model for anomaly detection in cloud datacenter networks,” IEEE Trans. Netw. Serv. Manage., vol. 16, no. 3, pp. 924-935, Jul.2019.

A. A. Nancy et al., “IoT-cloud-based smart healthcare monitoring system for heart disease prediction via deep learning,” Electronics, vol. 11, no. 15, p. 2292, Jul. 2022.

V. Gugueoth et al., “Security of Internet of things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects,” ICT Express, vol. 9, no. 5, pp. 941-960, Oct. 2023.

B. Kolosnjaji et al., “Deep learning for classification of malware system call sequences” in AI 2016, Adv. Artif. Intell. Cham: Springer International Publishing, pp. 137-149, Nov.2016.

D. Ingle and D. Ingle, “An enhanced blockchain based security and attack detection using transformer in IOT-cloud network,” ARASET, vol. 31, no. 2, pp. 142-156, Jul.2023

V. A. Devi et al., “Reliable and secure data transfer in IoT networks using knight-tour and PHLSB method,” ARASET, vol. 32, no. 2, pp. 107-118, Oct. 2023.

“UNSW_NB15,” Kaggle: Your Machine Learning and Data Science Community. Available at: https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15.

A. Asperti and M. Trentin, “Balancing reconstruction error and Kullback–Leibler divergence in variational autoencoders,” IEEE Access Pract. Innov. Open Solut., vol. 8, pp. 199440-199448, Oct. 2020.

“Kullback–Leibler divergence,” Wikipedia, The Free Encyclopedia. last modified September 18, 2023 https://en.wikipedia.org/w/index.php?title=Kullback%E2%80%93Leibler_divergence&oldid=1175951168.

“Deriving the KL divergence loss for VAEs,” Cross Validated. Available at: https://stats.stackexchange.com/questions/318748/deriving-the-kl-divergence-loss-for-vaes.

Downloads

Published

24.03.2024

How to Cite

Venkatachalam, C. ., Selvaraju, P. ., Sivalingam, T. S. ., Rajakumareswaran, V. ., Mohanambal, K., & Murali, M. (2024). Predicting IoT Botnet Attacks for Enhanced Data Transmission Security in the Cloud Using Variational Autoencoders. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 820–828. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5307

Issue

Section

Research Article