2021
DOI: 10.1007/978-3-030-88418-5_29
|View full text |Cite
|
Sign up to set email alerts
|

LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks

Abstract: IoT devices have been growing exponentially in the last few years. This growth makes them an attractive target for attackers due to their low computational power and limited security features. Attackers use IoT botnets as an instrument to perform DDoS attacks which caused major disruptions of Internet services in the last decade. While many works have tackled the task of detecting botnet attacks, only a few have considered early-stage detection of these botnets during their propagation phase. While previous ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…MLTs were used to categorize benign and malicious behaviors, employing a combination of Decision Trees (DTs), K Nearest Neighbors (KNNs), Random Forests (RFs), and Support Vector Machines (SVMs) for processing tasks [18]. Deep Learning Techniques such as FastGRNN, LSTMs, and GRU were evaluated by Giaretta et al [19], focusing on the identification of infected and compromised devices. Machine Learning Techniques were devised to detect IoT devices affected by botnets [20].…”
Section: Review Of Literaturementioning
confidence: 99%
“…MLTs were used to categorize benign and malicious behaviors, employing a combination of Decision Trees (DTs), K Nearest Neighbors (KNNs), Random Forests (RFs), and Support Vector Machines (SVMs) for processing tasks [18]. Deep Learning Techniques such as FastGRNN, LSTMs, and GRU were evaluated by Giaretta et al [19], focusing on the identification of infected and compromised devices. Machine Learning Techniques were devised to detect IoT devices affected by botnets [20].…”
Section: Review Of Literaturementioning
confidence: 99%
“…On the other hand, they conducted the same experiment using multilayer perceptron (MLPN) and long short-term memory (LSTM) and achieved accuracies of 89.1 and 87.6, respectively. In [ 25 ], the authors examined and compared three recurrent deep learning algorithms: FastGRNN, LSTM, and GRU. They used the three models to identify infected and soon-to-be-infected devices.…”
Section: Literature Reviewmentioning
confidence: 99%