Abstract
With the growth and development of Internet and wireless communication, Internet-of-Things (IoT) has become a prominent technology for smart devices. In general, IoT systems are treated as badly secured because of always on nature of connectivity and high complexity of distributed computing. Because of this IoT systems have attracted different types of malicious attacks. Botnet is also one of the major types of malicious attacks of IoT systems. Early detection of IoT-Botnet can help to secure the network. In recent years, Machine Learning and Deep Learning have become popular tools for Botnet detection. The performance of these models mainly depends on the available features in the dataset. Selection of the most pertinent set of features may play an important role in order to improve the performance of Machine Learning and Deep Learning based detection models. In this paper, we proposed a novel feature selection approach inspired by Ant Colony optimization algorithm followed by Artificial Neural Network based IoT-Botnet detection. The proposed model has performed significantly well with an accuracy of 99.68% as well as in terms of precision and recall metrics. The proposed model also performed well in terms of feature selection with the improvement in the accuracy of 5% compared to complete feature set.













Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability
Dataset used in this research work is freely available on the interenet and proper citation has been given for the dataset.
Code Availability
Custom code will be available on request.
References
Mahoney, M. S. (1988). The history of computing in the history of technology. Annals of the History of Computing, 10(2), 113–125. https://doi.org/10.1109/MAHC.1988.10011
Kim Ann Zimmermann, https://www.livescience.com/20718-computer-history.html.
Bahukhandi, S., & Rana, S. (2016). S, Introduction & History of Computer Viruses. Int. J. Sci. Eng. Res.,7(12), 44–47. https://www.ijser.org/onlineResearchPaperViewer.aspx?Introduction-History-of-Computer-Viruses.pdf. [Online]. Available:
Avira, https://www.avira.com/en/blog/malware-threat-report-q2-2020-statistics-and-trends.
UK Web Host Review, https://www.ukwebhostreview.com/cybersecurity-statistics/.
Joshi, C., & Bharti, V., & Ranjan, R. (2020). Botnet detection using machine learning algorithms. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences. https://doi.org/10.1007/978-981-15-7533-4.
Security Intelligence, https://securityintelligence.com/posts/internet-of-threats-iot-botnets-network-attacks/.
Kabir, M. M., Shahjahan, M., & Murase, K. (2012). A new hybrid ant colony optimization algorithm for feature selection. Expert Systems with Applications, 39(3), 3747–3763. https://doi.org/10.1016/j.eswa.2011.09.073
Jimenez, F., Martinez, C., Marzano, E., Palma, J. T., Sanchez, G., & Sciavicco, G. (2019). Multiobjective evolutionary feature selection for fuzzy classification. IEEE Transactions on Fuzzy Systems, 27(5), 1085–1099. https://doi.org/10.1109/TFUZZ.2019.2892363
Halim, Z., et al. (2021). An effective genetic algorithm-based feature selection method for intrusion detection systems. Computers and Security, 110, 102448. https://doi.org/10.1016/j.cose.2021.102448
Wang, P., Lin, H. T., Wang, T. C., et al. (2011). A new approach for solving the IP traceback problem for Web services. International Journal on Advances in Information Sciences and Service Sciences, 3(2), 46–59.
Wang, P., & Wang, Z. X. (2010). Taiwan Internet Conference (p. 2010). National University of Tainan.
Wang, P., Wang, R. X. et al. (2018) The reconstruction and analysis of the infection way of botnet. The 2010 Taiwan Internet Conference, National University of Tainan. TANET.
Wang, P., Wang, G. F. et al. (2010) The attack path analysis model of Botnet. In The 20th information security conference (CISC2010), the national traffic.
Yang, Z. M., Li, Q., & Liu, J. R. (2015). The research of the threat intelligence sharing and utilization Oriented to the attack tracking. The Information Security Research, 1(1), 31–36.
Wang, X. L., Yang, Q. H., & Jin, X. (2016). Periodic communication detection algorithm of botnet based on quantum computing. Chinese Journal of Quantum Electronics, 33(2), 182–187.
Singh, A., Ranjan, R. K., & Tiwari, A. (2021). Credit card fraud detection under extreme imbalanced data: A comparative study of data-level algorithms. Journal of Experimental Theoretical Artificial Intelligence. https://doi.org/10.1080/0952813X.2021.1907795
Mishra, A. M., Harnal, S., Mohiuddin, K., Gautam, V., Nasr, O. A., Goyal, N., Alwetaishi, M., & Singh, A. (2022). A deep learning-based novel approach for weed growth estimation. Intelligent Automation and Soft Computing, 31(2), 1157–1173.
Stevanovic, M., Pedersen J.M. (2013) Machine learning for identifying botnet network traffic Machine learning for identifying botnet network traffic (Technical report), vol. 17.
Benyahia, S., Meftah, B., & Lézoray, O. (2022). Multi-features extraction based on deep learning for skin lesion classification. Tissue and Cell, 74, 101701. https://doi.org/10.1016/j.tice.2021.101701
Rehman, M. U., Akhtar, S., Zakwan, M., & Mahmood, M. H. (2022). Novel architecture with selected feature vector for effective classification of mitotic and non-mitotic cells in breast cancer histology images. Biomedical Signal Processing and Control, 71, 103212. https://doi.org/10.1016/j.bspc.2021.103212
Rehman, M. U., Ryu, J., Nizami, I. F., & Chong, K. T. (2023). RAAGR2-Net: A brain tumor segmentation network using parallel processing of multiple spatial frames. Computers in Biology and Medicine, 152, 106426. https://doi.org/10.1016/j.compbiomed.2022.106426
Tyagi, A., & Mehra, R. (2020). An optimized CNN based intelligent prognostics model for disease prediction and classification from Dermoscopy images. Multimedia and Tools Applications, 79(35), 26817–26835.
Kumari, P., Jain, P. K., & Pamula, R. (2018). An efficient use of ensemble methods to predict students academic performance. In 2018 4th International Conference on Recent Advances in Information Technology (RAIT). (pp. 1-6). IEEE.
Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Generation Computer Systems, 100, 779–796. https://doi.org/10.1016/j.future.2019.05.041
Joshi, C., Bharti, V., & Ranjan, R. K. (2020). Analysis of feature selection methods for p2p botnet detection. In Advances in Computing and Data Sciences: 4th International Conference, ICACDS 2020, Valletta, Malta, April 24–25, 2020, Revised Selected Papers 4 (pp. 272–282). Springer Singapore.
Shabnam, Aditya, K.S., Chirag, J. (2019). Peer-To-Peer Botnet: Analysis of Botnet detection techniques using machine learning algorithms. International Journal of Electrical, Electronics and Data Communication (IJEEDC), 7(8), pp. 19-25
Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., & Garant, D. (2013). Botnet detection based on traffic behavior analysis and flow intervals. Computers and Security, 39(PARTA), 2–16. https://doi.org/10.1016/j.cose.2013.04.007
Nguyen, H.T., Ngo, Q.D., & Le, V.H. (2018). IoT Botnet detection approach based on PSI graph and DGCNN classifier. In 2018 IEEE International Conference on Information Communication and Signal Processing, ICICSP 2018. ICSP, 118-122. https://doi.org/10.1109/ICICSP.2018.8549713
Strayer, W. T., Walsh, R., Livadas, C., Lapsley D. (2006) Detecting botnets with tight command and control. In Proceedings of - Confernce on Local Computing Networks. LCN, pp. 195-202, , https://doi.org/10.1109/LCN.2006.322100
Xing, Y., Shu, H., Zhao, H., Li, D., & Guo, L. (2021). Survey on Botnet detection techniques: Classification, methods, and evaluation. Mathematical Problems in Engineering, 2021, 6640499. https://doi.org/10.1155/2021/6640499
Joshi, C., Ranjan, R. K., & Bharti, V. (2021). ANN based Multi-Class classification of P2P Botnet. International Journal of Computing and Digital System, 1319–1325.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.07.060
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2017.04.002
Bertino, E. (2016). Data security and privacy in the IoT. In Advances in Database Technology - EDBT. (Vol. 2016-March, pp. 1-3). OpenProceedings.org. https://doi.org/10.5441/002/edbt.2016.02
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other Botnets. Computer, 50(7), 80–84. https://doi.org/10.1109/MC.2017.201
Grizzard, J. B., et al. (2020). Cyberattacks detection in IoT-based smart city applications using machine learning techniques. International Journal of Environmental Research and Public Health, 17(24), 1–21. https://doi.org/10.3390/ijerph17249347
Tsimenidis, S., Lagkas, T., & Rantos, K. (2022). Deep learning in IoT intrusion detection. Journal of Network and Systems Management. https://doi.org/10.1007/s10922-021-09621-9
Popoola, S. I., Adebisi, B., Hammoudeh, M., Gui, G., & Gacanin, H. (2021). Hybrid deep learning for Botnet attack detection in the Internet-of-Things networks. IEEE Internet Things Journal, 8(6), 4944–4956. https://doi.org/10.1109/JIOT.2020.3034156
Joshi C., Bharti V., Ranjan R.K. (2020) Analysis of feature selection methods for P2P Botnet detection. In: Singh M., Gupta P., Tyagi V., Flusser J., Ören T., Valentino G. (eds) Advances in Computing and Data Sciences. ICACDS 2020. Communications in Computer and Information Science, vol 1244. Springer, Singapore. https://doi.org/10.1007/978-981-15-6634-9_25.
Khushaba, R. N., Kodagoda, S., Lal, S., & Dissanayake, G. (2010). Driver drowsiness classification using fuzzy wavelet-packet-based feature-extraction algorithm. IEEE Transactions on Biomedical Engineering, 58(1), 121–131.
García, S., Grill, M., Stiborek, J., & Zunino, A. (2014). An empirical comparison of botnet detection methods. Computers and Security, 45, 100–123. https://doi.org/10.1016/j.cose.2014.05.011
Joshi, C., Ranjan, R. K., & Bharti, V. (2021). A Fuzzy Logic based feature engineering approach for Botnet detection using ANN. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2021.06.018
Kumar, B., Ranjan, R. K., & Husain, A. (2021). A multi-objective enhanced fruit fly optimization (MO-EFOA) framework for Despeckling SAR images using DTCWT based local adaptive thresholding. International Journal of Remote Sensing, 42(14), 5493–5514. https://doi.org/10.1080/01431161.2021.1921875
Moodi, M., Ghazvini, M., Moodi, H., & Ghavami, B. (2020). A smart adaptive particle swarm optimization-support vector machine: android botnet detection application. Journal of Supercomputing, 76(12), 9854–9881. https://doi.org/10.1007/s11227-020-03233-x
Habib, M., Aljarah, I., Faris, H., & Mirjalili, S. (2020). Multi-objective particle swarm optimization for botnet detection in Internet of Things. Evolutionary Machine Learning Techniques: Algorithms and Applications. https://doi.org/10.1007/978-981-32-9990-0_10
Wang, P., Lin, H.T., Wang, T.S. (2011) A revised ant colony optimization scheme for discovering attack paths of botnet. In Proceedings of International Conference on Parallel Distribution System - ICPADS, pp. 918-923, https://doi.org/10.1109/ICPADS.2011.11
Saraç, E., & Özel, S. A. (2014). An ant colony optimization based feature selection for web page classification. The Scientific World Journal, 2014(5), 35–40. https://doi.org/10.1155/2014/649260
Almomani, O. (2020). A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry (Basel), 12(6), 1–20. https://doi.org/10.3390/sym12061046
Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12–22. https://doi.org/10.1109/MPRV.2018.03367731
Alaiz-Moreton, H., Aveleira-Mata, J., Ondicol-Garcia, J., Muñoz-Castañeda, A. L., García, I., & Benavides, C. (2019). Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity, 2019, 6516253.
Doshi, R., Apthorpe, N., and Feamster, N. (2018). Machine learning DDoS detection for consumer internet of things devices. In Proceedings of - 2018 IEEE Security and Privacy Workshops (SPW) 2018 no. Ml, pp. 29-35, 2018, https://doi.org/10.1109/SPW.2018.00013.
Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (2017). Malware traffic classification using Convolutional neural network for representation learning. International Conference on Information Networking. https://doi.org/10.1109/ICOIN.2017.7899588
Asadi, M., Jabraeil Jamali, M. A., Parsa, S., & Majidnezhad, V. (2020). Detecting botnet by using particle swarm optimization algorithm based on voting system. Future Generation Computer Systems, 107, 95–111.
Huseynov, K., Kim, K., & Yoo, P. D. (2014). In Semi-supervised Botnet Detection Using Ant Colony Clustering, 31th Symp (p. 7) Cryptography and Information Security (SCIS).
Sebastian G., Agustin P., & Maria J.E. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. https://doi.org/10.5281/zenodo.4743746
Dorigo, M., Maniezzo, V., Colorni, A. (1991). Positive feedback as a search strategy , Technical report, No. 91-016, Department of Electronics, Milan Polytechnic Institute, June .
Wang, P., Lin, H. T., Wang, T. C., & Kuo, P. T. (2011). A new approach for solving the IP traceback problem for Web services. International Journal on Advances in Information Sciences and Service Sciences, 3(2), 46–59.
Martin, J., & Crowley, J.L. (1995). Experimental comparison of correlation techniques. International Conference on Intelligent Autonomous Systems.
Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., and Nõmm, S. (2020). MedBIoT: Generation of an IoT botnet dataset in a medium-sized IoT network. In ICISSP 2020 - Proceedings of 6th International Conference on Information System of Security and Privacy. no. March, pp. 207-218, , https://doi.org/10.5220/0009187802070218
Vanitha, S., & Balasubramanie, P. (2023). Improved ant colony optimization and machine learning based ensemble intrusion detection model. Intelligent Automation and Soft Computing, 36(1), 849–864. https://doi.org/10.32604/iasc.2023.032324
Funding
No funding has been received for this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors whose names are listed immediately below certify that they have NO affiliations with or involvement in any organization or entity with any financial interest (such as honoraria; educational grants; participation in speakers’ bureaus; membership, employment, consultancies, stock ownership, or other equity interest; and expert testimony or patent-licensing arrangements), or non financial interest (such as personal or professional relationships, affi liations, knowledge or beliefs) in the subject matter or materials discussed in this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Joshi, C., Ranjan, R.K. & Bharti, V. ACNN-BOT: An Ant Colony Inspired Feature Selection Approach for ANN Based Botnet Detection. Wireless Pers Commun 132, 1999–2021 (2023). https://doi.org/10.1007/s11277-023-10695-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10695-8