Woodiss-Field, Ashley and Johnstone, Michael N. and Haskell-Dowland, Paul (2024) Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors, 24 (3). p. 1027. ISSN 1424-8220
sensors-24-01027.pdf - Published Version
Download (509kB)
Abstract
A botnet is a collection of Internet-connected computers that have been suborned and are controlled externally for malicious purposes. Concomitant with the growth of the Internet of Things (IoT), botnets have been expanding to use IoT devices as their attack vectors. IoT devices utilise specific protocols and network topologies distinct from conventional computers that may render detection techniques ineffective on compromised IoT devices. This paper describes experiments involving the acquisition of several traditional botnet detection techniques, BotMiner, BotProbe, and BotHunter, to evaluate their capabilities when applied to IoT-based botnets. Multiple simulation environments, using internally developed network traffic generation software, were created to test these techniques on traditional and IoT-based networks, with multiple scenarios differentiated by the total number of hosts, the total number of infected hosts, the botnet command and control (CnC) type, and the presence of aberrant activity. Externally acquired datasets were also used to further test and validate the capabilities of each botnet detection technique. The results indicated, contrary to expectations, that BotMiner and BotProbe were able to detect IoT-based botnets—though they exhibited certain limitations specific to their operation. The results show that traditional botnet detection techniques are capable of detecting IoT-based botnets and that the different techniques may offer capabilities that complement one another.
Item Type: | Article |
---|---|
Subjects: | European Repository > Multidisciplinary |
Depositing User: | Managing Editor |
Date Deposited: | 06 Feb 2024 04:50 |
Last Modified: | 06 Feb 2024 04:50 |
URI: | http://go7publish.com/id/eprint/4116 |