Next Article in Journal
Emotion-Based Literature Book Classification Using Online Reviews
Previous Article in Journal
Unlicensed Taxi Detection Model Based on Graph Embedding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment

1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Information Systems, College of Computer Science, King Khalid University, Abha 61413, Saudi Arabia
3
Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Makkah 21955, Saudi Arabia
4
Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
5
Department of Information Systems and Technology, College of Computer Science and Engineering, University of Jeddah, Jeddah 21589, Saudi Arabia
6
Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt
7
Department of Computer and Self Development, Prince Sattam bin Abdulaziz University, AlKharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(20), 3411; https://doi.org/10.3390/electronics11203411
Submission received: 28 August 2022 / Revised: 10 September 2022 / Accepted: 13 September 2022 / Published: 21 October 2022
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
Owing to the development and expansion of energy-aware sensing devices and autonomous and intelligent systems, the Internet of Things (IoT) has gained remarkable growth and found uses in several day-to-day applications. However, IoT devices are highly prone to botnet attacks. To mitigate this threat, a lightweight and anomaly-based detection mechanism that can create profiles for malicious and normal actions on IoT networks could be developed. Additionally, the massive volume of data generated by IoT gadgets could be analyzed by machine learning (ML) methods. Recently, several deep learning (DL)-related mechanisms have been modeled to detect attacks on the IoT. This article designs a botnet detection model using the barnacles mating optimizer with machine learning (BND-BMOML) for the IoT environment. The presented BND-BMOML model focuses on the identification and recognition of botnets in the IoT environment. To accomplish this, the BND-BMOML model initially follows a data standardization approach. In the presented BND-BMOML model, the BMO algorithm is employed to select a useful set of features. For botnet detection, the BND-BMOML model in this study employs an Elman neural network (ENN) model. Finally, the presented BND-BMOML model uses a chicken swarm optimization (CSO) algorithm for the parameter tuning process, demonstrating the novelty of the work. The BND-BMOML method was experimentally validated using a benchmark dataset and the outcomes indicated significant improvements in performance over existing methods.

1. Introduction

The Internet of Things (IoT) refers to an interconnected network of software, devices, actuators, sensors, and so on that exchange and store information. The advantages of the IoT include the flow of information, automation, and communication with less effort and time [1]. In the IoT structure, physical gadgets have capacities for organization and management derived from being smart gadgets, and such gadgets can become a vigorous part of human life, ranging from the home to big institutional and industrial fields. The IoT brings great innovation to lives by enabling indirect transmission among gadgets and individuals, making it susceptible to various cyber scams [2]. For the IoT, numerous security solutions have been devised, such as prevention, authentication, and detection. Using machine learning (ML) techniques with the IoT might resolve issues regarding privacy and security. Nowadays, it has become crucial to determine where automated techniques for rapid decision making should be run, such as the fog, the cloud, or the thin layer [3]. However, when all ML decisions are performed in the cloud, the IoT decision-making process is delayed. With other layers—namely, the fog or thin layer—it is difficult to apply ML solutions because of inadequate resources; namely, energy, bandwidth, and processing [4].
Several research scholars are trying to defend against botnet assaults on the IoT atmosphere. However, several gaps exist for the formulation of an effective detection mechanism. To deal with these attacks, an intrusion detection system (IDS) is one effective method [5]. However, conventional IDSs can often be positioned for IoT settings because of such problems. Complicated cryptographic systems could be embedded in many IoT gadgets for the usual reasons [6]. There are generally two types of IDSs: misuse and anomaly techniques. The misuse-related techniques, termed signature-related techniques, depend on the signs of attacks and are found in many public IDSs.
Existing research notes that deep learning (DL) approaches can detect IoT assaults highly efficiently compared to conventional ML techniques [7]. However, only the cloud layer has the resources for running such techniques. Moreover, such approaches are not continuously active in certain situations, such as remote live functioning, as the mechanism is supposed to constitute realistic decisions quickly [8]. Preceding work on IoT assaults has shown that an ML approach, such as support vector machine (SVM), could offer meaningful outcomes when it is linked with an optimization algorithm or feature reduction or extraction method [9]. This amalgamation of methods fails to address the low source requirement. ML approaches, such as K-nearest neighbors (KNNs), decision trees (DTs), naïve Bayes (NB), and others, are tremendously useful for applications such as non-interactive or offline predictions among small datasets [10]. Supporting all such variables, deep learning (DL) plays a significant role in the medical sector in maintaining security against numerous kinds of assaults and shedding light on the well-known ransomware attacks.
In this study, we designed a botnet detection model using barnacles mating optimizer with machine learning (BND-BMOML) for the IoT environment. For data normalization, the proposed model uses the Z-score normalization technique. Furthermore, the BMO algorithm is employed to select a useful set of features. Finally, chicken swarm optimization (CSO) with the Elman neural network (ENN) model is used for botnet detection. The experimental validation of the BND-BMOML model was carried out using a benchmark dataset.

2. Literature Review

In Vinayakumar et al. [11], a new botnet detection technique was developed on the basis of two-stage DL architecture to semantically distinguish botnet and legitimate performances at the application layer of the domain name system (DNS) service. Initially, the similarity measure of DNS queries is evaluated through a Siamese network based on predetermined thresholds for choosing the commonest DNS data across Ethernet connections. Next, a domain generation model related to DL framework is recommended for classifying normal and abnormal domain names. In [12], the presented method aims to recognize IoT botnet attacks initiated from compromised IoT gadgets by using the efficacy of the new grey wolf optimizer (GWO) algorithm to discover the features that better define IoT botnet complexity and simultaneously improve the hyperparameter of the one class support vector machine (OCSVM). Popoola et al. [13] developed a robust DL-oriented botnet attack detection technique that could manage extremely imbalanced network traffic datasets. In particular, the synthetic minority oversampling technique (SMOTE) produces further minority samples to achieve class balance, whereas DRNN learns hierarchical feature representation from the balanced network traffic dataset to implement discriminatory classification.
Sriram et al. [14] developed a DL-oriented botnet framework that functions on network traffic flow. The presented method gathers network traffic flow, transforms it to connection records, and applies a DL algorithm to identify assaults originating from the compromised IoT gadgets. Habib et al. [15] developed a detection system based on multi-objective particle swarm optimization (MOPSO) to recognize malicious behavior in IoT network traffic. The efficiency of MOPSO can be confirmed in contrast to filter-based feature selection methods, conventional ML algorithms, and the multi-objective non-dominating sorting genetic algorithm (NSGA-II). Wu et al. [16] designed a common architecture based on the deep reinforcement learning (DRL) technique that efficiently produces adversarial traffic flows to deceive the detection technique by automatically adding perturbation to the sample. During the entire process, the target detector is considered a black box and to be closer to real-time attacks. An RL agent is armed to upgrade the adversarial instances by merging the feedback from the target models (malicious or benign) and the series of activities and is capable of changing the spatial and temporal features of traffic flows when preserving the executability and original functionality.
The author of [17] addresses the IoT cybersecurity threat in smart cities and develops an anomaly detection-IoT (AD-IoT) technique using a smart anomaly detection-based random forest approach. The presented technique could efficiently identify compromised IoT devices at distributed fog nodes. McDermott et al. [18] developed a solution to the recognition of botnet activity within networks and consumer IoT gadgets. A new application of the DL technique was utilized to develop a detection method related to the bidirectional long short term memory (Bi-LSTM)-based recurrent neural network (RNN). Then, word embeddings were used for recognition of attack packets and text conversion into tokenized integer format. The proposed technique was compared with the LSTM-RNN in identifying four attack vectors utilized by the Mirai botnet and the loss and accuracy were estimated.

3. The Proposed Model

In this article, a new BND-BMOML algorithm was developed for the identification and recognition of botnets in the IoT environment. To accomplish this, the BND-BMOML model initially follows a data standardization approach. In the presented BND-BMOML model, the BMO algorithm is employed to select a useful set of features. For botnet detection, the BND-BMOML technique employs the CSO with ENN model in this study. Figure 1 demonstrates the block diagram of the BND-BMOML system.

3.1. Data Standardization

The data standardization procedure (DSP) is a crucial stage in data preprocessing used primarily to provide feature scaling to ensure features are on nearly similar scales, such that all the features are equivalently significant. The DSP makes the data easy to process with the ML algorithm. In the study, the standardization process (Z-score normalization) was used, where each feature is rescaled to make sure the standard deviation and mean are within the range of 0 and 1, correspondingly. In this research, the Z-score normalization was employed as follows:
X s t a n d = X m e a n   X S t a n d a r d   D e v i a t i o n   X
The Z-score normalization is effective for different optimization approaches and, specifically, gradient descent (GD), which is widely applied by ML algorithms. The aim of standardization is to enhance the performance of ML algorithms and avoid or mitigate bias in ML classification.

3.2. Feature Selection Using BMO Algorithm

At this stage, the BMO algorithm is employed to select a useful set of features from the preprocessed data, thereby increasing accuracy and reducing computation complexity [19]. Barnacles are often found permanently attached to solid substances, such as ships, rocks, sea turtles, and corals. Barnacles are hermaphroditic organisms that have male and female reproduction systems, and the unique feature of barnacles is their penis size, which can stretch to more than the length of their body (up to seven or eight times). The barnacle mating takes place through sperm-cast and normal copulation. In the mating of isolated barnacles, sperm-cast takes place. This can be performed by discharging the fertilized eggs into water. Such behaviors of barnacles in releasing novel offspring provide insights into the use of BMO for resolving the problem of optimization. Like other evolutionary approaches, such as the genetic algorithm (GA), BMO employs the same technique to develop the selection method for the parent to be mated for producing novel offspring. However, the solution process is dissimilar from the GA and does not utilizing familiar selection techniques; namely/ tournament, roulette wheels, and so on. The selection procedure for barnacles that mate can be undertaken according the subsequent rules:
  • Although barnacles are recognized as hermaphroditic organisms, female barnacles can be fertilized by one or more male barnacles, where all the barnacles are mated with each other to prevent complications;
  • The value of p l should be initially set by the user and the selective barnacle parents can be arbitrarily performed. The value of p l is the control variable in these algorithms that could be tuned to attain better optimization outcomes, along with maximum iterations and number of barnacles;
  • The Hardy–Weinberg principle is used when the selective barnacle parents lie in the range of p l . Then, the sperm-cast is imposed to achieve novel offspring.
The generation of novel offspring is guided by the Hardy–Weinberg principle as follows:
x i N _ n e w = p x b a r n a c l e _ m N + q x b a r n a c l e _ d N   f o r   k p l
x i N _ n e w = r a n d ( ) × x b a r n a c l e _ m N   f o r   k > p l
where k = b a r n a c l e _ m b a r n c l e _ d ,   p indicates the random number uniformly distributed, q = 1 p , and x b a r n a c l e _ m N and x b a r n a c l e _ d N show the variables chosen randomly for the barnacle parents correspondingly. Furthermore, rand ( ) means the random integer ranges between zero and one 0 1 . p and q characterize the inheritance percentage from the corresponding barnacles’ parents. For instance, p is set to 0.80. This shows that the novel offspring inherit 20% (100% − 20%) of the father’s features and 80% of the behavior or features of the mother. Equation (4) is used for the exploitation of optimization whereas Equation is used as the exploration of the proposed BMO. Further, it is noteworthy that the exploration (sperm-cast) can only be related to the mother’s barnacles because they receive sperm discharged from another barnacle elsewhere. As soon as the barnacle breeds, the number in the population will be doubled from the early population. To control these expansions, something has to be implemented. Like the GA, a sorting method is required in BMO where a better outcome for a specific iteration is positioned at the top half of the doubled populations.
In the modeled BMO technique, the fitness function (FF) is employed to balance the classifier accuracy (maximal) and the selected feature count in every solution (minimal) obtained with the selected feature. Equation (10) symbolizes the FF for the computing solution:
F i t n e s s = α γ R D + β R C
At this point, γ R D denotes the classifier error rate of a presented classifier (K-nearest neighbor (KNN) classifier). R represents the cardinality of chosen set and C indicates the number of features in the data. α and β display the two variables for the significance of classification quality and subset length, respectively. ∈[1, 0] and β = 1 α .

3.3. Botnet Detection Using ENN Model

In this study, the ENN model was exploited for botnet detection. The ENN consists of output, input, hidden, and context layers [20]. The major formation of this NN is FFNN; therefore, the relationship within the output, input, and hidden layers (HLs) is completely associated with the multi-layer NN. Furthermore, there exists another layer in the ENN, which is called the context layer. Its input comes from the output of HLs and it stores the initial values of the HLs. The external input, output, and context weight matrixes are defined by W h 0 ,   W h i ,   W h c . By considering the ENN form, the dimensions of the input, as well as output layers, are n —viz., x 1 t = [ x 1 1 t , x 2 1 t , . , x n 1 t ] T and y t = [ y 1 t ,   y 2 t ,   ,   y n t ] T —and the dimension of the context layer is m :
u i l = e i l , i = 1 , 2 ,   ,   n
In Equation (5), l indicates the output and input layers in iteration l . Then, k HLs are considered as follows:
v k l = j = 1 N ω k j 1 l x j c l + i = 1 n ω k i 2 l u i l k = 1 , 2 , , N
Now, x j c l designates the signal that is transported from the k - th context layer, and ω k j 1 l describes the i - th and j - th weights of the HLs directed from the o - th nodes. Therefore, for the input layer I , the weight of HL k is obtained from ω k i 2 l . This is accomplished using:
W k l = f 0 v ¯ k l
v ¯ k l = v k l max v k l
which indicates the standardized value of the HL. The next layer is the context layer. Here, the outcome is equivalent to the subsequent expression:
C k l = β C , l 1 + W k l 1 ,   k = 1 , 2 , , N
In Equation (9), W k indicates the self-connected feedback amongst [0, 1] and it is given as follows:
y 0 l = k = 1 N ω o k 3 l W k , l ,   0 = 1 , 2 , , n
In Equation (10), ω o k 3 determines the weight connecting the k - th to the o - th layers. Figure 2 defines the framework of the ENN technique.
To optimally choose the ENN parameters, the CSO algorithm was applied in this work.

3.4. Parameter Tuning Using CSO Algorithm

Finally, the weight of the abovementioned ENN model was improved based on the CSO algorithm. The CSO algorithm is stimulated from the hierarchy and foraging behavior of chicken flocks [21]. In the CSO, the location of every individual was considered a candidate solution to the optimized problem. The count of individuals in the chicken flock can be represented as N. Each individual searches for food in a D dimensional space and upgrades their identity at each G generation. The sequence of serial numbers of each individual can be 1 , 2 , 3 , ,   N r , N r + 1 , ,   t N h N h + 1 , ,   N c , whereas N r ,   N h , and N c indicate the maximal serial numbers of the roosters, hens, and chicks in sub-flock afterward sorting, correspondingly. The original and updated location of each rooster is determined as X i , j and X i , j n e w , whereby i 1 , 2 , 3 , , N r ,   j 1 , 2 , 3 , ,   D . Roosters with low fitness can forage food in a wide search area, as is shown in the following.
X i G j n e w = X i , j 1 + a n d n 0 , σ 2
σ 2 = exp   ( f n f i f i + ζ ) t   i f   f i > f n 1 t   o t h e r w i s e
Now, a n d n 0 , σ 2 indicates the uniformly distributed random number with an average value of 0 and standard deviation of σ 2 .   f shows the fitness function. f i and f n denote the fitness value of the i - th rooster and n - th rooster, correspondingly, whereas i , n 1 , 2 , 3 , ,   N r and i n .   ζ denotes a number closer to 0 , which is utilized to prevent the denominator f i + ζ from being 0 . The original and upgraded locations of hens are determined by X i , j and X i , j n e w , whereas i N r + 1 , N r + 2 , ,   N h ,   j 1 , 2 , 3 , ,   D .   X c , j denotes the location of the spouse, and X d , j indicates the location of the individual, where i hens want to steal food, in which c 1 , 2 , 3 , ,   t N r ,   d 1 , 2 , 3 , ,   N h . The searching and stealing capabilities of the hens are associated with their fitness value.
X i , j n e w = X i , j + S 1 a n d X c , j X i , j + S 2 a n d X d , j X i , j
S 1 = exp   f i f C f i + ζ
S 2 = exp   f d f i
Now, a n d indicates a random integer ranging from 0 ,   1 . The chick follows its mother for food foraging. The small fitness value makes it simple for them to search food by foraging as follows:
X i , j n e w = X i , j + ϖ X m , j X i , j
In Equation (16), X i , j and X i , j n e w indicate the original and upgraded locations of chicks, correspondingly. For every chick, i     224   N h + 1 , N h + 2 , ,   N m , and j 1 , 2 , 3 , ,   D .   X m , j shows the location of the mother hen analogous to the i - th chicks, where m N γ + 1 , N γ + 2 ,   , N h .   ϖ refers to the succeeding probability for all the chicks that follow their mother hen to forage. Considering the variances among all the chicks, ϖ is generated at random among [0, 2] as presented in Algorithm 1.
Algorithm 1: Pseudo-Code of the Original CSO Algorithm
Input: Randomly allocated primary values to individuals from the chicken flock; Determine parameters namely N r , N h , and   N c ;
t = 0 ;
Compute fitness values to all individuals
While   t < T max do
If   t   %   G = = 0
   Rank the fitness values and classifies the flock as distinct sub-groups;
End if
For   i = 1 : N r
    Upgrade   X i , j with Equation (11);
End for
For   i = N r + 1 : N m
    Upgrade   X i , j with Equation (13);
End for
For   i = N m + 1 : N c
    Update   X i , j with Equation (16);
End for
If   f X i , j < f ( X i , j n e w )
    X i , j = X i , j ;
Else
    X i , j = X i , j n e w ;
End if
    t = t + 1 ;
End while
Output: Optimal hyperparameter values
The CSO algorithm derives a fitness function (FF) to obtain an improved classifier outcome. In this study, the reduced classifier error rate is considered as the FF, as given below in Equation (17).
f i t n e s s x i = C l a s s i f i e r E r r o r R a t e x i = n u m b e r   o f   m i s c l a s s i f i e d   s a m p l e s T o t a l   n u m b e r   o f   s a m p l e s 100

4. Results and Discussion

The proposed model was simulated using Python 3.6.5. The experiments for the proposed model used a PC i5-8600k, GeForce 1050Ti 4 GB, 16 GB RAM, 250 GB SSD, and 1 TB HDD. The parameter settings were as follows: learning rate: 0.01, dropout: 0.5, batch size: 5, epoch count: 50, and activation: ReLU.
This section inspects the bot net classification results of the BND-BMOML model on the N_BaIoT [22] dataset. The dataset comprises 17,001 samples with three class labels. Table 1 provides a detailed explanation of the dataset.
Figure 3 illustrates the confusion matrices formed by the BND-BMOML model. In the entire dataset, the BND-BMOML model categorized 4933 samples into the benign class, 6963 samples into the Mirai class, and 4925 samples into Gafgyt. Moreover, in 70% of the TR dataset, the BND-BMOML method categorized 3425 samples into the benign class, 4900 samples into the Mirai class, and 3447 samples into Gafgyt. Next, on 30% of the TS dataset, the BND-BMOML approach categorized 1508 samples into the benign class, 2063 samples into the Mirai class, and 1478 samples into Gafgyt.
Table 2 and Figure 4 offer brief botnet detection results using the BND-BMOML model for the entire dataset. The results show that the BND-BMOML model achieved enhanced results under all classes. For instance, in the benign class, the BND-BMOML model provided an a c c u y of 99.18%, p r e c n of 98.54%, r e c a l of 98.66%, F s c o r e of 98.60%, and MCC of 98.02%. Furthermore, in the Mirai class, the BND-BMOML technique offered a c c u y of 99.52%, p r e c n of 99.39%, r e c a l of 99.46%, F s c o r e of 99.42%, and MCC of 99.02%. Finally, in the Gafgyt class, the BND-BMOML approach presented a c c u y of 99.18%, p r e c n of 98.72%, r e c a l of 98.50%, F s c o r e of 98.61%, and MCC of 98.03%.
Table 3 and Figure 5 portray the detailed botnet detection results for the BND-BMOML methodology with 70% of the TR dataset. The BND-BMOML approach demonstrated enhanced results with all classes. For example, in the benign class, the BND-BMOML model offered a c c u y of 99.12%, p r e c n of 98.45%, r e c a l of 98.53%, F s c o r e of 98.49%, and MCC of 97.87%. Additionally, in the Mirai class, the BND-BMOML algorithm rendered a c c u y of 99.54%, p r e c n of 99.39%, r e c a l of 99.49%, F s c o r e of 99.44%, and MCC of 99.05%. Moreover, in the Gafgyt class, the BND-BMOML method achieved a c c u y of 99.19%, p r e c n of 98.74%, r e c a l of 98.51%, F s c o r e of 98.63%, and MCC of 98.06%.
Table 4 and Figure 6 present brief botnet detection results for the BND-BMOML technique using 30% of the TS dataset. The BND-BMOML method displayed enhanced results in every class label. For example, in the benign class, the BND-BMOML algorithm rendered a c c u y of 99.31%, p r e c n of 98.76%, r e c a l of 98.95%, F s c o r e of 98.85%, and MCC of 98.36%. Additionally, in the Mirai class, the BND-BMOML technique presented a c c u y of 99.49%, p r e c n of 99.37%, r e c a l of 99.37%, F s c o r e of 99.37%, and MCC of 98.94%. Furthermore, in the Gafgyt class, the BND-BMOML method, offered a c c u y of 99.16%, p r e c n of 98.66%, r e c a l of 98.47%, F s c o r e of 98.57%, and MCC of 97.97%.
The training accuracy (TRA) and validation accuracy (VLA) attained by the BND-BMOML method in the test dataset are shown in Figure 7. The experimental outcome shows that the BND-BMOML algorithm gained maximum values for TRA and VLA. The VLA was seemingly greater than the TRA.
The training loss (TRL) and validation loss (VLL) acquired by the BND-BMOML technique in the test dataset are displayed in Figure 8. The experimental outcome shows that the BND-BMOML technique exhibited minimal values for the TRL and VLL. Particularly, the VLL was less than the TRL.
A clear precision-recall analysis of the BND-BMOML algorithm in the test dataset is exemplified in Figure 9. The figure shows that the BND-BMOML algorithm resulted in enhanced precision-recall values in every class label.
Table 5 and Figure 10 offer a detailed comparative study of the BND-BMOML model and existing models [23]. The results indicate that the DBN, LSTM, and CNN-RNN models reported lower classification performance. Next, the LSTM-CNN and DNN models achieved slightly higher classifier results. Though the DNN-LSTM model reached reasonable performance with a classification accuracy of 99.11, the BND-BMOML model shows the maximum accuracy of 99.32%.
Finally, a brief running time (RUNT) examination of the BND-BMOML model and recent models is provided in Table 6 and Figure 11. The attained results show that the LSTM and DBN models reported higher RUNTs of 3.86 ms and 3.97 ms. Along with that, the DNN-LSTM and CNN-RNN models attained slightly improved RUNTs of 1.27 ms and 1.15 ms, respectively. The LSTM-CNN and DNN models revealed reasonable RUNTs of 0.35 ms and 0.59 ms, respectively. However, the BND-BMOML model showed superior results, with a minimal RUNT of 0.17 ms. Thus, the BND-BMOML model was found to be better than existing models.

5. Conclusions

In this article, a new BND-BMOML system was established for the identification and recognition of botnets in the IoT environment. To accomplish this, the BND-BMOML model initially follows the data standardization approach. In the presented BND-BMOML model, the BMO algorithm is employed to select a useful set of features. For botnet detection, the BND-BMOML technique employs the ENN model in this study. Finally, the presented BND-BMOML model uses the CSO algorithm for parameter tuning process. Experimental validation of the BND-BMOML approach was applied using a benchmark dataset and the results portrayed a significant improvement in performance over existing methods. Thus, the presented BND-BMOML technique can be exploited for the real-time botnet detection process. In the future, the performance of the BND-BMOML technique can be improved using advanced DL models.

Author Contributions

Conceptualization, F.S.A. and M.M.; methodology, A.G.; software, A.M.; validation, A.Y., R.A. and O.A.; formal analysis, H.M.; investigation, A.Y.; resources, H.M.; data curation, A.M.; writing—original draft preparation, F.S.A., M.M., A.Y. and A.G.; writing—review and editing, R.A., O.A. and H.M.; visualization, A.M.; supervision, F.S.A.; project administration, A.M.; funding acquisition, F.S.A. and A.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

This article does not contain any studies with human participants performed by any of the authors.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the Small Groups Project under grant number (168/43) and Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R319), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work with Grant Code: 22UQU4320484DSR02.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through the contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Pokhrel, S.; Abbas, R.; Aryal, B. IoT security: Botnet detection in IoT using machine learning. arXiv 2021, arXiv:2104.02231. [Google Scholar]
  2. Chen, Z. Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm. J. Comput. Cogn. Eng. 2022, 1, 103–108. [Google Scholar]
  3. Shinan, K.; Alsubhi, K.; Alzahrani, A.; Ashraf, M.U. Machine learning-based botnet detection in software-defined network: A systematic review. Symmetry 2021, 13, 866. [Google Scholar] [CrossRef]
  4. Vasko, F.J.; Lu, Y.; McNally, B. A Simple Methodology that Efficiently Generates All Optimal Spanning Trees for the Cable-Trench Problem. J. Comput. Cogn. Eng. 2022, 1, 13–20. [Google Scholar]
  5. Namasudra, S.; Crespo, R.G.; Kumar, S. Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec). Comput. Electr. Eng. 2022, 100, 108048. [Google Scholar] [CrossRef]
  6. Gutub, A. Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol. 2022, 2, 1–13. [Google Scholar] [CrossRef]
  7. Das, S.; Namasudra, S. Multi-Authority CP-ABE-Based Access Control Model for IoT-Enabled Healthcare Infrastructure. IEEE Trans. Ind. Inform. 2022; in press. [Google Scholar] [CrossRef]
  8. Alauthman, M.; Aslam, N.; Al-Kasassbeh, M.; Khan, S.; Al-Qerem, A.; Choo, K.K.R. An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 2020, 150, 102479. [Google Scholar] [CrossRef]
  9. Sarkar, S.; Saha, K.; Namasudra, S.; Roy, P. An efficient and time saving web service based android application. SSRG Int. J. Comput. Sci. Eng. 2015, 2, 18–21. [Google Scholar]
  10. Wani, A.; Khaliq, R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans. Intell. Technol. 2021, 6, 281–290. [Google Scholar] [CrossRef]
  11. Vinayakumar, R.; Alazab, M.; Srinivasan, S.; Pham, Q.V.; Padannayil, S.K.; Simran, K. A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Trans. Ind. Appl. 2020, 56, 4436–4456. [Google Scholar] [CrossRef]
  12. Al Shorman, A.; Faris, H.; Aljarah, I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J. Ambient Intell. Human. Comput. 2020, 11, 2809–2825. [Google Scholar] [CrossRef]
  13. Popoola, S.I.; Adebisi, B.; Ande, R.; Hammoudeh, M.; Anoh, K.; Atayero, A.A. smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 2021, 21, 2985. [Google Scholar] [CrossRef] [PubMed]
  14. Sriram, S.; Vinayakumar, R.; Alazab, M.; Soman, K.P. Network flow based IoT botnet attack detection using deep learning. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6 July 2020; pp. 189–194. [Google Scholar]
  15. Habib, M.; Aljarah, I.; Faris, H.; Mirjalili, S. Multi-objective particle swarm optimization for botnet detection in internet of things. In Evolutionary Machine Learning Techniques; Springer: Singapore, 2020; pp. 203–229. [Google Scholar]
  16. Wu, D.; Fang, B.; Wang, J.; Liu, Q.; Cui, X. Evading machine learning botnet detection models via deep reinforcement learning. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  17. Alrashdi, I.; Alqazzaz, A.; Aloufi, E.; Alharthi, R.; Zohdy, M.; Ming, H. Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 305–310. [Google Scholar]
  18. McDermott, C.D.; Majdani, F.; Petrovski, A.V. Botnet detection in the internet of things using deep learning approaches. In Proceedings of the 2018 IEEE International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
  19. Houssein, E.H.; Abdelminaam, D.S.; Hassan, H.N.; Al-Sayed, M.M.; Nabil, E. A hybrid barnacles mating optimizer algorithm with support vector machines for gene selection of microarray cancer classification. IEEE Access 2021, 9, 64895–64905. [Google Scholar] [CrossRef]
  20. Ding, L.; Bai, Y.; Liu, M.D.; Fan, M.H.; Yang, J. Predicting short wind speed with a hybrid model based on a piecewise error correction method and Elman neural network. Energy 2022, 244, 122630. [Google Scholar] [CrossRef]
  21. Liang, S.; Fang, Z.; Sun, G.; Liu, Y.; Qu, G.; Zhang, Y. Sidelobe reductions of antenna arrays via an improved chicken swarm optimization approach. IEEE Access 2020, 8, 37664–37683. [Google Scholar] [CrossRef]
  22. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-BaIoT—Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [Google Scholar] [CrossRef] [Green Version]
  23. Sattari, F.; Farooqi, A.H.; Qadir, Z.; Raza, B.; Nazari, H.; Almutiry, M. A Hybrid Deep Learning Approach for Bottleneck Detection in IoT. IEEE Access 2022, 10, 77039–77053. [Google Scholar] [CrossRef]
Figure 1. Block diagram of BND-BMOML approach.
Figure 1. Block diagram of BND-BMOML approach.
Electronics 11 03411 g001
Figure 2. Structure of the ENN.
Figure 2. Structure of the ENN.
Electronics 11 03411 g002
Figure 3. Confusion matrices for BND-BMOML approach: (a) entire dataset, (b) 70% of TR data, and (c) 30% of TS data.
Figure 3. Confusion matrices for BND-BMOML approach: (a) entire dataset, (b) 70% of TR data, and (c) 30% of TS data.
Electronics 11 03411 g003
Figure 4. Average analysis of BND-BMOML algorithm using entire dataset.
Figure 4. Average analysis of BND-BMOML algorithm using entire dataset.
Electronics 11 03411 g004
Figure 5. Average analysis of BND-BMOML algorithm using 70% of the TR data.
Figure 5. Average analysis of BND-BMOML algorithm using 70% of the TR data.
Electronics 11 03411 g005
Figure 6. Average analysis for BND-BMOML algorithm using 30% of the TS data.
Figure 6. Average analysis for BND-BMOML algorithm using 30% of the TS data.
Electronics 11 03411 g006
Figure 7. TRA and VLA analysis for BND-BMOML algorithm.
Figure 7. TRA and VLA analysis for BND-BMOML algorithm.
Electronics 11 03411 g007
Figure 8. TRL and VLL analysis for BND-BMOML algorithm.
Figure 8. TRL and VLL analysis for BND-BMOML algorithm.
Electronics 11 03411 g008
Figure 9. Precision-recall curve analysis for BND-BMOML algorithm.
Figure 9. Precision-recall curve analysis for BND-BMOML algorithm.
Electronics 11 03411 g009
Figure 10. Comparative analysis of BND-BMOML approach and recent algorithms.
Figure 10. Comparative analysis of BND-BMOML approach and recent algorithms.
Electronics 11 03411 g010
Figure 11. Running time analysis of BND-BMOML approach and recent algorithms.
Figure 11. Running time analysis of BND-BMOML approach and recent algorithms.
Electronics 11 03411 g011
Table 1. Dataset details.
Table 1. Dataset details.
ClassNo. of Samples
Benign5000
Mirai7001
Gafgyt5000
Total Number of Samples17,001
Table 2. Result analysis for BND-BMOML algorithm with distinct class labels using entire dataset.
Table 2. Result analysis for BND-BMOML algorithm with distinct class labels using entire dataset.
Entire Dataset
LabelsAccuracyPrecisionRecallF-ScoreMCC
Benign99.1898.5498.6698.6098.02
Mirai99.5299.3999.4699.4299.02
Gafgyt99.1898.7298.5098.6198.03
Average99.2998.8898.8798.8898.35
Table 3. Result analysis for BND-BMOML algorithm with distinct class labels using 70% of the TR data.
Table 3. Result analysis for BND-BMOML algorithm with distinct class labels using 70% of the TR data.
Training Phase (70%)
LabelsAccuracyPrecisionRecallF-ScoreMCC
Benign99.1298.4598.5398.4997.87
Mirai99.5499.3999.4999.4499.05
Gafgyt99.1998.7498.5198.6398.06
Average99.2898.8698.8598.8598.32
Table 4. Result analysis for BND-BMOML algorithm with distinct class labels using 30% of the TS data.
Table 4. Result analysis for BND-BMOML algorithm with distinct class labels using 30% of the TS data.
Testing Phase (30%)
LabelsAccuracyPrecisionRecallF-ScoreMCC
Benign99.3198.7698.9598.8598.36
Mirai99.4999.3799.3799.3798.94
Gafgyt99.1698.6698.4798.5797.97
Average99.3298.9398.9398.9398.43
Table 5. Comparative analysis of BND-BMOML approach and recent algorithms.
Table 5. Comparative analysis of BND-BMOML approach and recent algorithms.
MethodsAccuracyPrecisionRecallF-Score
BND-BMOML99.3298.9398.9398.93
DNN-LSTM99.1198.3798.2498.16
LSTM97.1495.9394.6295.18
CNN-RNN96.4194.0197.5894.03
LSTM-CNN98.8596.9897.6296.15
DNN98.8296.9896.3794.75
DBN96.9295.4096.8596.07
Table 6. Running time analysis for BND-BMOML approach and recent algorithms.
Table 6. Running time analysis for BND-BMOML approach and recent algorithms.
MethodsRunning Time (ms)
BND-BMOML0.17
DNN-LSTM1.27
LSTM3.86
CNN-RNN1.15
LSTM-CNN0.35
DNN0.59
DBN3.97
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

S. Alrayes, F.; Maray, M.; Gaddah, A.; Yafoz, A.; Alsini, R.; Alghushairy, O.; Mohsen, H.; Motwakel, A. Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment. Electronics 2022, 11, 3411. https://doi.org/10.3390/electronics11203411

AMA Style

S. Alrayes F, Maray M, Gaddah A, Yafoz A, Alsini R, Alghushairy O, Mohsen H, Motwakel A. Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment. Electronics. 2022; 11(20):3411. https://doi.org/10.3390/electronics11203411

Chicago/Turabian Style

S. Alrayes, Fatma, Mohammed Maray, Abdulbaset Gaddah, Ayman Yafoz, Raed Alsini, Omar Alghushairy, Heba Mohsen, and Abdelwahed Motwakel. 2022. "Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment" Electronics 11, no. 20: 3411. https://doi.org/10.3390/electronics11203411

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop