Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Applied Sciences  /  Vol: 14 Par: 4 (2024)  /  Artículo
ARTÍCULO
TITULO

Distributed Detection of Large-Scale Internet of Things Botnets Based on Graph Partitioning

Kexiang Qian    
Hongyu Yang    
Ruyu Li    
Weizhe Chen    
Xi Luo and Lihua Yin    

Resumen

With the rapid growth of IoT devices, the threat of botnets is becoming increasingly worrying. There are more and more intelligent detection solutions for botnets that have been proposed with the development of artificial intelligence. However, due to the current lack of computing power in IoT devices, these intelligent methods often cannot be well-applied to IoT devices. Based on the above situation, this paper proposes a distributed botnet detection method based on graph partitioning, efficiently detecting botnets using graph convolutional networks. In order to alleviate the wide range of IoT environments and the limited computing power of IoT devices, the algorithm named METIS is used to divide the network traffic structure graph into small graphs. To ensure robust information flow between nodes while preventing gradient explosion, diagonal enhancement is applied to refine the embedding representations at each layer, facilitating accurate botnet attack detection. Through comparative analysis with GATv2, GraphSAGE, and GCN across the C2, P2P, and Chord datasets, our method demonstrates superior performance in both accuracy and F1 score metrics. Moreover, an exploration into the effects of varying cluster numbers and depths revealed that six cluster levels yielded optimal results on the C2 dataset. This research significantly contributes to mitigating the IoT botnet threat, offering a scalable and effective solution for diverse IoT ecosystems.

 Artículos similares

       
 
Austin Anderson, Petros Potikas and Katerina Potika    
Community detection has been (and remains) a very important topic in several fields. From marketing and social networking to biological studies, community detection plays a key role in advancing research in many different fields. Research on this topic o... ver más
Revista: Information

 
Bahareh Lashkari and Petr Musilek    
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract?s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods re... ver más
Revista: Information

 
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen    
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and... ver más
Revista: Applied Sciences

 
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif    
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid... ver más
Revista: Applied Sciences

 
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis    
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS... ver más
Revista: AI