2022
DOI: 10.3390/electronics11050737
|View full text |Cite
|
Sign up to set email alerts
|

SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks

Abstract: The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages in classification tasks, such as simplicity, effectiveness, and robustness. However, it does not perform well in handling large datasets such as the Bot-IoT dataset, which represents a huge amount of data about botnet attacks on IoT networks. Therefore, improving the kNN performance in classifying IoT botnet attacks is the main… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 52 publications
0
10
0
Order By: Relevance
“…• Data characteristics and dimensions: The complexity of managing network traffic data is heightened due to its high-dimensional features and the extensive number of access points within Internet-connected services [26]. In addition, the categorization of botnet intrusions in IoT networks through the KNN algorithm becomes particularly difficult when confronted with voluminous datasets [27]. In the same vein, the prevalence of class imbalance within IoT IDS adversely impacts the efficiency and accuracy of ML models that are developed based on these skewed datasets [28]; • Security vulnerabilities and attacks: Addressing IoT networks' security vulnerabilities and attacks is inherently challenging, especially those that incorporate cloud technologies, as they are prone to various attacks [29].…”
Section: Key Challenges Of Intrusion Detection In Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…• Data characteristics and dimensions: The complexity of managing network traffic data is heightened due to its high-dimensional features and the extensive number of access points within Internet-connected services [26]. In addition, the categorization of botnet intrusions in IoT networks through the KNN algorithm becomes particularly difficult when confronted with voluminous datasets [27]. In the same vein, the prevalence of class imbalance within IoT IDS adversely impacts the efficiency and accuracy of ML models that are developed based on these skewed datasets [28]; • Security vulnerabilities and attacks: Addressing IoT networks' security vulnerabilities and attacks is inherently challenging, especially those that incorporate cloud technologies, as they are prone to various attacks [29].…”
Section: Key Challenges Of Intrusion Detection In Iotmentioning
confidence: 99%
“…Syamsuddin and Barukab [27] improved the KNN algorithm for IoT botnet attack classification by selecting optimal features through a technique named SUKRY, which is part of a Suricata-based IDS. They employed data preprocessing, feature selection, and anomaly classification with KNN.…”
Section: Ensemble and Transfer Learning-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…The features of its backdoor make it possible for additional instructions and functions to be carried out on a machine that has been hacked. Among these operations include verifying the current condition of the infection, removing the bot from IRC [16], coming up with a random username, sending ping attacks, forcing a bot to join a channel, carrying out SYN flood or DDoS attacks, and a great deal more. In the same year, Agobot revealed the concept of a modular staged attack.…”
Section: Related Workmentioning
confidence: 99%
“…The classification of geographic areas based on the latitude and longitude coordinates provided by GNSS is a novel research topic [23,24]. KNN represents a conceptual approach to classification (or prediction) that extends into new research areas, as seen in recent studies [32][33][34], which apply KNN in various domains. Our research aligns with this trend.…”
Section: Introductionmentioning
confidence: 99%