Zum Hauptinhalt springen

IoT Botnet Attack Detection Model Based on DBO-Catboost

Yang, Changjin ; Guan, Weili ; et al.
In: Applied Sciences, Jg. 13 (2023-06-01), Heft 12, S. 7169-7169
Online academicJournal

IoT Botnet Attack Detection Model Based on DBO-Catboost 

With the widespread adoption of Internet of Things (IoT) technology, the increasing number of IoT devices has led to a rise in serious network security issues. Botnets, a major threat in network security, have garnered significant attention over the past decade. However, detecting these rapidly evolving botnets remains a challenge, with current detection accuracy being relatively low. Therefore, this study focuses on designing efficient botnet detection models to enhance detection performance. This paper improves the initial population generation strategy of the Dung Beetle Optimizer (DBO) by using the centroid opposition-based learning strategy instead of the original random generation strategy. The improved DBO is applied to optimize Catboost parameters and is employed in the field of IoT botnet detection. Performance comparison experiments are conducted using real-world IoT traffic datasets. The experimental results demonstrate that the proposed method outperforms other models in terms of accuracy and F1 score, indicating the effectiveness of the proposed approach in this field.

Keywords: IoT; botnet; catboost; dung beetle optimizer

1. Introduction

The rapid development of the Internet of Things (IoT) has brought many conveniences to modern society, such as smart homes [[1]], smart grids [[2]], smart cities [[3]], and the Industrial Internet of Things [[4]]. The IoT enables communication between machines through the internet, connecting a large number of online devices and allowing them to actively participate in the network. The decreasing prices of IoT devices are accelerating their proliferation and growth. According to Cisco's prediction [[5]], by the end of 2023 the global number of IoT devices will exceed 29 billion. The exponential growth of IoT devices is widely applied in various applications to enhance service quality and efficiency. However, IoT devices face limitations due to resource constraints and the need to adapt to heterogeneous environments, which introduce security vulnerabilities.

On one hand, a large number of commonly used devices such as televisions, refrigerators, surveillance cameras, doors, windows, cups, and light bulbs are interconnected with other devices through technology such as Bluetooth and ZigBee, greatly facilitating people's lives. However, this also provides attackers with more opportunities to invade and steal user information, including privacy and property security [[6]]. On the other hand, the IoT is an extension and expansion of the traditional Internet, making the core network more complex and massive. The deployment of numerous outdoor and resource-constrained sensing nodes makes the network more vulnerable to external attacks. If the network experiences a failure, the consequences can be even more severe [[7]]. When IoT devices suffer from unauthorized intrusions, this not only involves intangible information assets but also tangible objects in real life. The target devices being compromised can lead to user information leakage, property loss, and even threats to users' personal safety. Recent trends indicate a corresponding increase in network attacks as the number of these insecure IoT devices rapidly grows.

One common attack scenario is when network hackers target IoT devices to turn them into part of a zombie network. Once infected, these devices are controlled and utilized by attackers to expand the zombie network continuously. After gaining control over multiple IoT devices, the infected zombie network devices are used to carry out various attacks, such as gaining unauthorized access to user information, massive spam email sending, and executing DDoS attacks. The impact of IoT zombie networks is extremely severe, as exemplified by the Mirai botnet in 2016, which infected millions of devices and conducted the largest DDoS attack in history [[8]]. As mentioned earlier, the creation of IoT botnet networks is a major attack method. Therefore, people usually employ various security control measures, such as intrusion detection, to detect and prevent IoT botnet attacks. Although these methods are effective to some extent, they cannot detect the formation of zero-day IoT botnet networks without known signatures [[10]]. In addition, infected IoT devices within a zombie network may not exhibit obvious signs of infection and can continue to operate normally without detection. Therefore, detecting and identifying infected IoT devices is a challenging task [[11]]. To protect IoT devices from botnet attacks, it has been recognized that an effective zombie network detection model needs to be established for defense [[12]]. Currently, research on IoT zombie network detection methods can be broadly classified into two categories: machine-learning-based detection methods and deep-learning-based detection methods. These detection methods have made significant progress in terms of detection accuracy. However, there are still limitations, including: (1) deep-learning-based methods demanding high computational resources, which are not suitable for resource-constrained IoT devices; (2) overly complex machine learning models; and (3) machine learning detection models being limited to the specific datasets they were trained on.

This paper aims to propose an IoT botnet detection model based on DBO-Catboost. In this model, the DBO algorithm is improved by incorporating a centroid opposition-based learning strategy to generate the initial population. The improved DBO algorithm produces initial solutions that are closer to the algorithm's optimal solution. The improved DBO algorithm is then used to optimize the hyperparameters of Catboost, and applied to the IoT botnet detection. The experiments utilize real IoT datasets, Botnet and Bot-IoT, and make comparisons with existing detection models. The experimental results demonstrate that the IoT botnet detection model based on IDBO-Catboost outperforms other state-of-the-art classifiers in terms of accuracy and F1 score. It also exhibits higher detection efficiency and possesses a certain degree of generalization capability.

2. Related Works

With the continuous development of machine learning, machine learning algorithms have been widely applied in the field of IoT security and play a crucial role in IoT zombie network detection.

Ryu et al. [[13]] conducted research on different ML algorithms such as Naive Bayes, Decision Trees, etc., to detect zombie network behavior in network traffic. The researchers evaluated these methods using the CTU-13 zombie network dataset, and most of the approaches performed well, especially ensemble algorithms that outperformed individual classifiers in detecting zombie network attacks in network traffic. Xiao et al. [[14]] compared the random forest algorithm with five other machine learning algorithms as training models. The experimental results showed that the proposed model performed the best according to the given evaluation criteria. Pei et al. [[15]] presented a zombie network detection model based on Light GBM, and the experimental results demonstrated that the model achieved a higher detection accuracy and effectively detected zombie networks. Alshamkhany et al. [[16]] proposed the use of emerging machine learning techniques for detecting zombie networks or malicious traffic activities. Four classifiers, namely Naive Bayes, K-Nearest Neighbors, Support Vector Machines, and Decision Trees, were applied, and the experimental results showed that the decision tree model outperformed the other classifier models. Biradar et al. [[17]] employed a combination of supervised machine learning techniques for zombie network detection, using DNS data in the detection process. The main advantage of this method was its superior accuracy in detecting zombie networks, but the most significant drawback was the complexity of the model. Injadat et al. [[18]] presented a machine-learning-based optimization framework that combined Bayesian optimization with Gaussian process algorithms and decision tree classification models to detect attacks on IoT devices in an effective and efficient manner. Vishwakarma [[19]] employed techniques such as random forest, decision trees, AdaBoost, and XGBoost to tackle the issue of imbalanced datasets. He implemented undersampling, oversampling, ensemble learning, and gradient boosting methods. Afterwards, he trained and tested the optimal model on diverse attack datasets to analyze its performance. Al et al. [[20]] introduced a novel unsupervised evolutionary IoT zombie network detection method. The main contribution of the proposed method was the utilization of an efficient population intelligence algorithm called the Grey Wolf Optimization algorithm to detect IoT zombie network attacks initiated from compromised IoT devices. It also optimized the hyperparameters of the one-class support vector machine and identified the features that best described the IoT zombie network problem. Salam et al. [[21]] proposed an improved method for detecting IoT zombie networks by using particle swarm optimization to adjust the hyperparameters of ONE-SVM. This method outperformed existing algorithms in terms of false positive rate, true positive rate, and G-mean value across all categories of IoT devices. Alharbi et al. [[22]] introduced a graph-based ML model for zombie network detection. The model first considered the importance of graph features and then developed a generalized model for detecting zombie networks based on the selected important features. Maudoux et al. [[23]] combined preprocessed decision trees and highlighted different types of zombie networks by detecting their intrinsic exchanges. This aggregated IP flows into traffic flows to extract key features and avoid overfitting. Krishnan et al. [[24]] developed an adaptive voting classifier that could detect all attack categories in the BoT-IoT dataset with higher performance scores. Shen et al. [[25]] integrated multiple deep learning models based on a Stacking ensemble learning technique and provided different input feature sets for different primary classifiers to obtain an online detection model for zombie networks. The experiments demonstrated that the proposed ensemble-learning-based online detection method for zombie networks could effectively detect zombie network traffic at multiple stages, with a malicious traffic detection rate of up to 96.47%. Maurya et al. [[26]] utilized IoT zombie network traffic to design an experimental test platform for generating real-time datasets. Extensive comparative studies were conducted on the proposed dataset and existing datasets using popular machine learning techniques. Waqas et al. [[27]] evaluated common machine learning algorithms based on performance metrics, and the results showed that tree-based algorithms achieved the highest accuracy in Botnet attack detection on the same sensor devices. Wang et al. [[28]] introduced zombie network detection architecture based on artificial neural networks, which could better differentiate DGA domains and correctly handle more domains. Gong et al. [[29]] enhanced the LGBM model by utilizing a Bayesian hyperparameter optimization algorithm and employed it for zombie network detection. Compared to existing models, this model outperformed existing methods in terms of accuracy, false alarm rate, and recall rate. Deng et al. [[30]] proposed a graph neural-network-based model for detecting IoT zombie networks, which was more easily applicable to unseen data during training compared to other methods.

Currently, many detection models are based on intelligent optimization algorithms. Table 1 summarizes the related research on intelligent optimization algorithms in IoT botnet detection models.

In conclusion, the academic community has made significant progress in research on detecting IoT zombie network attacks. However, due to the complex and ever-changing nature of the IoT environment, as well as the rapid evolution of zombie networks, there is a need for further improvement and refinement in the accuracy of detection models. Additionally, most studies have only conducted experiments on a single dataset, which fails to demonstrate the generalizability of the proposed methods. This work aims to optimize the process of model hyperparameter selection using a novel swarm intelligence optimization algorithm. It is the first time that the DBO algorithm has been combined with the Catboost model and applied in the field of IoT botnet detection, resulting in the achievement of optimal classification results.

3. Methods

3.1. Catboost Algorithm

The Catboost algorithm [[31]] is a machine learning framework based on the gradient boosting decision tree algorithm. It exhibits excellent classification capabilities when dealing with high-dimensional sparse data. It features adaptive learning rate adjustment, randomized data ordering, automatic handling of missing values and categorical features, and fast training speed. The algorithm also provides numerous hyperparameters and regularization options, facilitating customization and optimization for different application scenarios. Furthermore, the method of using ranking boosts addresses noise points in the training set, avoiding errors caused by gradient estimation and mitigating prediction bias. It effectively handles noisy data in large datasets, such as those found in zombie networks.

3.2. Dung Beetle Optimizer

The dung beetle optimizer (DBO) [[32]] is a swarm intelligence optimization algorithm inspired by the rolling, foraging, stealing, and breeding behaviors of dung beetles. This algorithm performs both global exploration and local exploitation simultaneously, exhibiting fast convergence. In comparison to other swarm intelligence optimization algorithms, the Dung Beetle Optimizer offers the following advantages:

(1) It introduces a novel rolling mechanism for dung beetles, where different search modes utilize information from different time periods to deeply explore the search space and achieve stronger search capabilities, thus avoiding becoming trapped in local optima.

(2) The dynamic nature of the parameter "R" stimulates exploration and exploitation within the Dung Beetle Optimizer.

(3) Different region-based search strategies, including the spawning region and the best foraging region, promote the developmental behaviors of the Dung Beetle Optimizer, resulting in enhanced global search capabilities.

(4) Various update rules ensure a proper balance between local and global search capabilities, maintaining an appropriate equilibrium within the developed Dung Beetle Optimizer.

Overall, the Dung Beetle Optimizer leverages the behavior of dung beetles to offer an efficient and effective optimization algorithm capable of balancing exploration and exploitation for solving complex problems.

3.3. Rules for Updating the Position of Various Dung Beetle Species

The position updating rules for different types of beetles are as follows:

To simulate the rolling behavior of the rolling beetles, they need to move along a given direction within the entire search space. During the rolling process, the position of a rolling beetle is updated and can be represented as follows:

(1) xit+1=xi+α×k×xit1+b×Δx

(2) Δx=xitΧw

where t represents the current iteration number of the algorithm and xit represents the position information of the i-th beetle at the t-th iteration. k is a constant representing the deviation coefficient, b is a constant belonging to the interval (0, 1), α is the natural coefficient, and Δx=xitΧw represents the simulated change in light intensity. Χw represents the current global worst position.

Additionally, when the beetle's path encounters obstacles, it needs to change its forward direction through a "dance" behavior. This behavior is mimicked using a tangent function. Once the new path is determined, the beetle's position is updated using the following formula:

(3) xit+1=xit+tanθxitxit1

where θ ranges from [0, π].

The position updating of breeding beetles requires setting a boundary to simulate the oviposition area of female beetles. It can be defined as:

(4) Lb*=maxX*×1R,Lb

(5) Ub*=maxX*×1+R,Ub

where X* represents the current local best position and Ub* and Lb* represent the upper and lower boundaries of the oviposition area, respectively. R=1t/Tmax and Tmax represent the maximum number of iterations, while Ub and Lb represent the upper and lower bounds of the optimization problem.

After the hatchlings emerge, it is necessary to establish an optimal foraging zone to guide the beetles in their search for food. The optimal foraging zone can be represented as follows:

(6) Lbb=maxXb×1R,Lb

(7) Ubb=minXb×1+R,Ub

where Xb represents the global best position, and other parameters are defined as mentioned above. The position of the foraging beetles is defined as:

(8) xit+1=xit+C1×xitLbb+C2×xitUbb

where C1 represents a random number following a normal distribution, and C2 represents a random variable belonging to the interval (0, 1).

Finally, concerning the beetles referred to as thieves, they will steal dung balls from other beetles. Since Xb represents the global best position, it can be assumed that the vicinity of Xb is the optimal location for food acquisition. During the iteration process, the position updating of the thief beetles can be defined as:

(9) xit+1=Xb+S×g×xitX*+xitXb

where g is a random vector of size 1 × D following a normal distribution, and S represents a constant.

3.4. Improved Dung Beetle Optimizer

Controlling the quality of the initial population in DBO is crucial for enhancing the algorithm performance. The quality is primarily determined by two factors: the search range and the initial positions. If the search range is too narrow, it hampers the algorithm's ability to explore. Conversely, if the initial positions are close to the global optimal solution, the population can effectively uncover valuable information within a superior solution space. However, the standard DBO adopts a random initialization method to generate the population, which makes it difficult to meet the above two requirements.

To address this issue, this paper introduces the centroid opposition-based learning strategy (COBL) [[33]] to generate the initial population. The basic idea is to calculate the reverse solution based on the centroid of the population. This approach allows for searching high-quality solutions in a wider range, effectively improving the quality of the initial population. The initialization of the population using the centroid opposition-based learning strategy is as follows:

Let (X1, ..., Xn) be n points in a D-dimensional search space with unit weight. The centroid of the entire set is defined as follows:

(10) M=X1++Xnn

then we have:

(11) Md=1ni=1nxid,i=1,2,,n,d=1,2,,D

If the centroid of a discrete and uniformly distributed set is denoted Md , then the opposite-point Xˇi of a point is Xi is defined as follows:

(12) Xˇi=2×MdXi,i=1,2,,n

when the reverse point exceeds the search space, recompute the reverse point according to Equation (4):

(13) Xˇi=xmind+r×Mdxmind,Xˇi<xmindMd+r×xmaxdMd,Xˇi>xmaxd

In the equation, xmind and xmaxd represent the upper and lower limit values in the D-dimensional space, respectively. r is a uniformly distributed random number on [0, 1].

3.5. IDBO-Catboost Model

Optimizing the hyperparameters of a machine learning model can significantly impact its performance [[34]]. However, tuning hyperparameters can be time-consuming and computationally expensive. Hyperparameter tuning can be carried out through manual trial-and-error, or by using relatively simple algorithms such as random search, grid search, or Bayesian optimization. While manual tuning is straightforward, it often leads to local optima. On the other hand, random search and grid search can partially mitigate these issues, but are less efficient when dealing with high-dimensional parameter spaces. Bayesian optimization offers a more efficient approach for finding optimal hyperparameters, but it requires defining a probability model and may demand additional computational resources to train the model.

In comparison to these methods, the dung beetle optimization algorithm is a novel swarm intelligence optimization algorithm that demonstrates fast convergence and strong global search capabilities. It can effectively discover the optimal combination of parameters in machine learning models.

When predicting botnet attacks using the Catboost model, inappropriate parameter settings can have a significant impact on the model's predictions. Therefore, in this paper an improved dung beetle optimization (IDBO) algorithm was chosen to optimize the important hyperparameters of the Catboost model. The ensemble model solves the problem of the Catboost model easily, becoming stuck in local optima while further improving the accuracy of the predictions.

The design concept of the IDBO-Catboost detection model combines the dung beetle optimizer algorithm with the Catboost algorithm, optimizing the key parameters in Catboost that have the most significant impact on classification performance. This approach leverages the parameter optimization capabilities of the DBO algorithm and combines it with the strengths of Catboost in handling classification problems, achieving an organic integration of the two. It eliminates the tedious manual tuning process. The IDBO-Catboost detection model is illustrated in Figure 1.

The optimization process of Catboost using the improved dung beetle optimizer can be described in the following steps:

Step 1: Initialize the Catboost model parameters and determine the optimal range based on experience. Set algorithm control parameters such as population size, maximum number of iterations, and position boundaries. Randomly define the positions of the beetles in the search space and form a new population according to the centroid opposition-based learning strategy.

Step 2: Calculate the fitness values of all beetles based on the objective function.

Step 3: Start the loop and update the positions of the beetles.

Step 4: Check if each beetle is out of bounds.

Step 5: Calculate the individual best and global best solutions, as well as their fitness values, based on the current positions of the beetles. The individual best represents the best solution found by each beetle, and the global best is selected from these individual best solutions.

Step 6: Repeat the above steps until the stopping criteria are met—either the maximum number of iterations is reached or the model performance reaches a pre-defined threshold. When the algorithm finishes, the global best solution and its fitness value are outputted. The global best solution represents the optimal parameter combination for the Catboost algorithm, and the fitness value represents the classification performance of the model in terms of AUC (Area Under the Curve).

In this experiment, the parameters that have the most significant impact on the performance of the Catboost algorithm are the number of gradient boosting trees (iterations), learning_rate, and maximum tree depth (depth). The dung beetle optimizer is used to search for the optimal parameters for these parameters. The pseudocode for constructing the IDBO-Catboost model is shown in Algorithm 1.

Algorithm 1: IDBO-Catboost Pseudocode
Input: A Catboost model with n hyperparameters, a training set, the maximum number of iterations (

Tmax

) for the dung beetle optimizer, a population size (N) for the dung beetle optimizer, and upper bound (Ub) and lower bound (Lb) for the dung beetle optimizer
Output: IDBO-Catboost Modle
1: Initialization: population size, search dimensionality, maximum number of iterations, search range.
2: The centroid opposition-based learning strategy forms a new population.
3: While iterations t < Tmaxdo
4: for i ← 1 to N do
5: if i == rolling beetle then
6: δ = rand(1)
7: if δ < 0.9 then
8: Update the position of the rolling beetle using Equation (1)
9: else
10: Update the position of the rolling beetle using Equation (3)
11: end if
12: end if
13: if i == breeding beetle then
14: Update the position of the breeding beetle using Equations (4) and (5)
15: end if
16: if i == foraging beetle then
17: Update the position of the foraging beetle using Equation (8)
18: end if
19: if i == thief beetle then
20: Update the position of the thief beetle using Equation (9)
21: end if
22: end for
23: if the newly generated position is better than the previous position then
24: Update the corresponding position
25: end if
26: Iteration t = t + 1
27: end while
28: return the optimal position (best hyperparameter combination for Catboost) and the fitness value (AUC value).
29: Build the IDBO-Catboost model

4. Experimental Results

In this section, the performance of the proposed improved DBO-Catboost detection model is compared and evaluated using publicly available datasets.

4.1. Experimental Environment

The hardware platform used in this experiment included CPU: 12th Generation Intel Core i5 12400f, GPU: NVIDIA GeForce 3060 Ti, 32 GB 3200 Mhz RAM, and a 1 TB SSD for storage.

The software platform for this experiment was conducted on Windows 10 operating system, using Python 3.7 as the primary programming language. Various tools and packages such as pandas, sklearn, and numpy were employed for the experiment.

4.2. Dataset Introduction

The dataset used in this experiment was the Botnet dataset [[35]], created by the Canadian Institute for Cybersecurity. The dataset was divided into training and testing sets. The details of the dataset are presented in Table 2.

4.3. Data Preprocessing

Data preprocessing is an essential step in machine learning, involving cleaning, transforming, and standardizing raw data before feeding it into a model. The main purpose of data preprocessing is to improve data quality, enhance model performance, and increase generalization ability.

Typically, data preprocessing involves several steps:

Step1: Data cleaning. The primary objective is to remove duplicate and invalid values from the dataset. This also involves handling missing values by imputation.

Step2: Data type conversion. This refers to the process of converting the data type of features to a different format. Machine learning algorithms typically require numerical data, so non-numeric features need to be converted into a numerical format for the algorithms to process.

Step3: Standardization. Some features in the dataset may have varying scales or ranges of values. To simplify the learning process of the model, it is necessary to standardize the features in the dataset.

Step4: Feature engineering. The Botnet dataset consists of 83 features, many of which are redundant. These redundant features can negatively impact the model training. In this study, principal component analysis (PCA) [[36]] is used for feature dimensionality reduction.

It is worth noting that Catboost has strong capabilities in handling missing values. It can automatically detect and handle missing data, eliminating the need for additional feature engineering and reducing the time required for data preprocessing before training. In this section, to ensure consistency across all experiments, the preprocessed dataset was used.

4.4. Evaluation Metrics

This article utilized evaluation metrics such as the confusion matrix, precision, recall, accuracy, and F1 score to analyze and assess the classification results. The confusion matrix is defined as shown in Table 3.

Accuracy: refers to the proportion of correctly predicted samples out of the total samples:

(14) Accuracy=TP+TNTP+FP+TN+FN×100%

Precision: refers to the probability of correctly predicting a positive instance:

(15) Precision=TPTP+FP×100%

Recall: refers to the probability of correctly predicting a positive instance among all actual positive samples:

(16) Recall=TPTP+FN×100%

F1 Score: represents the harmonic mean of precision and recall:

(17) F1-Score=2×Precision×RecallPrecision+Recall×100%

4.5. Experimental Results

The Catboost algorithm had a significant impact on the classification performance through parameters such as the maximum number of trees (iterations), tree depth (depth), and learning rate (learning_rate). In this study, the dung beetle optimizer was used to optimize these parameters for Catboost. When using DBO-Catboost, the iteration count was set to 100. After several preliminary experiments, it was observed that 30 iterations were sufficient for the DBO-Catboost model to converge. Therefore, the iteration count was set to 30, the number of beetle populations was set to 40, and the parameter search ranges were set as follows: Iterations = [500, 1000], depth = [4, 16], learning_rate = [0.01, 0, 2].

To verify the optimization effectiveness of the improved DBO algorithm on the model, particle swarm optimization (PSO), grey wolf optimization (GWO), and the original dung beetle optimization (DBO) algorithms were used for comparison. The number of iterations was set to 30, and the AUC value of the model was used as the fitness function. The results are shown in Figure 2.

From the results in Figure 2, it can be observed that the improved DBO algorithm achieved faster convergence, reaching convergence after 16 iterations. In terms of the AUC value, after 30 iterations the IDBO-Catboost model had the highest AUC value, indicating better optimization performance. Comparing the improved DBO algorithm with the unimproved DBO algorithm, the improved DBO algorithm had a higher initial fitness value, and the final fitness value was also higher, with a faster iteration speed. This indicates that the improved DBO generated a better initial population that was closer to the optimal solution, requiring fewer iterations to converge on the vicinity of the best solution. This result validates the effectiveness of our improvement in the generation rules of the initial DBO population.

The experimental results on the Botnet dataset, comparing Catboost, PSO-Catboost, GWO-Catboost, and the original DBO-Catboost models, are shown in Table 4.

According to the information in Table 4, the optimization strategy of IDBO-Catboost effectively found the best parameter combination for the model, improving its performance. In a vertical comparison with Catboost, IDBO-Catboost outperformed Catboost with an improvement of 2.17% in accuracy and F1 score. In a horizontal comparison, DBO-Catboost outperformed PSO-Catboost and GWO-Catboost with improvements of 1.21% and 1.38% in F1 score and accuracy, respectively. As for the comparison with the original DBO-Catboost, the IDBO-Catboost showed a slight improvement of 0.35% in accuracy and F1 score. Although the improvement was modest, it still represents a significant value when applied in real-life scenarios. The main reason for these differences is that the improved DBO algorithm can increase the population size and diversity of the population by optimizing the oviposition area, thereby better utilizing the search space. Additionally, by optimizing the strategy for generating the initial population, the algorithm can come closer to the optimal solution within the search space, enhancing its search capability. Therefore, the improved DBO algorithm can comprehensively explore the search space and achieve better global search capability to obtain the optimal parameter combination for the Catboost algorithm.

Figure 3 shows the ROC curves of several models. According to the information in Figure 3, we can see that the ROC curve of IDBO-Catboost was closer to the top-left corner, indicating that IDBO-Catboost achieved a better balance between sensitivity and specificity. Additionally, the AUC value of IDBO-Catboost was the highest among all the comparison models, reaching 0.99. Therefore, this result effectively demonstrates that the model has good performance and high discriminative ability at different thresholds.

After validating the optimization effect of IDBO on the Catboost algorithm, we compared it with the recently proposed models, namely BO-GP-DT (2020), GWO-OCSVM (2020), PSO-ONE-SVM (2021), BO-LGBM (2022), and the original DBO-Catboost. The parameter settings for the models are shown in Table 5, and the experimental results from the Botnet dataset are presented in Table 6.

From the results in Table 6, it can be observed that IDBO-Catboost achieved the highest accuracy of 96.21% among all the comparative models. It outperformed BO-GP-DT, BO-LGBM, GWO-OCSVM, PSO-ONE-SVM, and the original DBO-Catboost by 1.04%, 0.63%, 0.72%, 0.55%, and 0.35%, respectively. Similarly, IDBO-Catboost also demonstrated superior precision, recall, and F1 score compared to other models, indicating its optimal classification performance.

There are two main reasons for these results: firstly, compared to decision trees and SVM algorithms, gradient-boosting tree-based algorithms such as Catboost and LGBM perform better when dealing with large-scale datasets, and the Catboost algorithm is particularly effective in handling noisy data in the dataset. Secondly, for optimization algorithms, the ability to balance global and local searches is crucial. In the dung beetle optimizer, the breeding behavior ensures that new individuals have better fitness, foraging behavior accelerates the speed of local search, stealing behavior utilizes better solutions discovered in the global search, and rolling behavior increases the algorithm's diversity, helping it to escape local optima and further improving the global search capability. Finally, the improved DBO algorithm generates an initial population that is closer to the optimal solution, allowing it to better find the optimal parameter combination. Through the combined effect of these behaviors, the algorithm achieves a balance between global and local search, thereby enhancing its search ability and optimization performance, effectively improving the detection and classification performance of the model.

To evaluate the generalization ability of the proposed method, the Bot-IoT dataset [[37]] was used for performance assessment. Due to the severe class imbalance in the Bot-IoT dataset, where there was a small amount of normal data and a large amount of attack data, the dataset was processed using a combination of the SMOTE technique and an undersampling technique to achieve a balanced dataset. The data preprocessing workflow is shown in Figure 4, and the sample distribution before and after dataset processing is illustrated in Figure 5.

Table 7 presents the performance of the IDBO-Catboost and the comparison models on the processed Bot-IoT dataset.

From the information in Table 7, it can be observed that compared to other models, IDBO-Catboost achieved higher detection accuracy on the Bot-IoT dataset, with an accuracy and F1 score of 98.57%. This indicates that the hyperparameters identified by IDBO-Catboost were highly effective, and the model exhibited good generalization ability. The main reason for this result was the presence of the dynamically changing parameter R in the dung beetle optimizer, which allowed the algorithm to adapt better to different problems and enhance the model's generalization performance.

In addition to performance metrics such as accuracy and F1 score, the average time (sum of model training and prediction time) of the proposed model and other detection models on the Botnet dataset and Bot-IoT dataset are compared in Table 8. It can be observed that the IDBO-Catboost detection model requires less time compared to the other detection models. This is because the IDBO-Catboost model can utilize GPU acceleration for training, thereby improving the detection efficiency of the model. Regarding DBO-Catboost and Catboost, the IDBO-Catboost model has fewer iterations, resulting in a shorter training time compared to DBO-Catboost and Catboost models.

In summary, this paper conducted experiments using two datasets, Botnet and Bot-IoT, related to Internet of Things (IoT) botnet networks. By comparing with existing detection models, the proposed improved DBO-Catboost detection model demonstrated the best classification performance in terms of high accuracy and detection efficiency. Therefore, it can be effectively applied to the detection tasks of IoT botnet networks.

5. Conclusions

To address the issue of designing an effective zombie network detection model and improving detection performance, this paper proposes a zombie network detection model based on the improved DBO-CatBoost. We improved the initial population generation strategy of the dung beetle optimization algorithm, replacing random initialization with the centroid opposition-based learning strategy, and applied it to the field of IoT botnet network detection. The improved DBO-CatBoost model utilized the dung beetle optimizer to optimize the hyperparameters of CatBoost, reducing the cumbersome and repetitive process of hyperparameter tuning and improving efficiency. The proposed method was validated using real-world IoT traffic datasets. Experimental results demonstrate that the proposed approach achieved accuracy rates of 96.10% and 98.57% on the Botnet and Bot-IoT datasets, respectively. It outperformed all the compared models in terms of classification performance and exhibited a certain level of generalization capability.

There are some limitations in this study that need to be addressed. When dealing with imbalanced datasets, further research is needed to improve the focus on the minority class and enhance the detection performance of the model on imbalanced data. Additionally, in the future, introducing interpretability mechanisms will be beneficial to improve the explainability of the model.

Figures and Tables

Graph: Figure 1 IDBO-Catboost Botnet Detection Model.

Graph: Figure 2 Changes in AUC values for the number of iterations. (a) IDBO-Catboost, (b) DBO-Catboost, (c) PSO-Catboost, and (d) GWO-Catboost.

Graph: applsci-13-07169-g002b.tif

Graph: Figure 3 AUC values and ROC curves of different models.

Graph: Figure 4 Imbalanced data handling process.

Graph: Figure 5 Dataset sample distribution.

Table 1 Related studies on intelligent optimization algorithms for IoT botnet detection.

YearReferenceMethodologyDatasetModelPerformance
2020Injadat et al. [18]BO-GPBot-IoTBO-GP-DTAccuracy: 99.99%
2020Al et al. [20]GWON-BaIoTGWO-OCSVMG-Mean: 96.8%
2021Salam et al. [21]PSONN-BaIoTPSO-ONE-SVMG-Mean: 98.7%
2022Gong et al. [29]BOCTU-13BO-LGBMAccuracy: 96.62%, F1 Score: 86.71%

Table 2 Basic Information of Botnet Dataset.

Number of SamplesNumber of FeaturesAttackNormal
Training Set331,85284173,192158,660
Testing Set345,74684212,154133,592

Table 3 Confusion Matrix.

Predicted PositivePredicted Negative
Actual PositiveTPFP
Actual NegativeFNTN

Table 4 Comparison of experimental results.

MethodsPrecisionRecallAccuracyF1-Score
Catboost94.09%93.93%93.93%93.93%
DBO-Catboost95.84%95.75%95.75%95.75%
IDBO-Catboost96.21%96.10%96.10%96.10%
PSO-Catboost95.00%94.89%94.89%94.89%
GWO-Catboost94.83%94.72%94.72%94.72%

Table 5 Parameter settings.

MethodsParameter Settings
BO-GP-DTmax_depth = 6, max_leaf_nodes = 11, min_samples_leaf = 2, min_samples_split = 7
BO-LGBMmax_depth = 18, learning_rate = 0.58, n_estimators = 800, num_leaves = 35
DBO-CatboostIterations = 849, learning_rate = 0.12, depth = 8
IDBO-CatboostIterations = 816, learning_rate = 0.17, depth = 7
GWO-OCSVM

ν =0

.061,

Υ =0

.21, Kenel = rbf
PSO-ONE-SVM

ν =0

.053,

Υ =0

.22, Kenel = rbf

Table 6 Experimental Comparison of Various Models on Botnet.

MethodsPrecisionRecallAccuracyF1-Score
BO-GP-DT95.19%95.06%95.06%95.06%
BO-LGBM95.53%95.47%95.47%95.47%
DBO-Catboost95.84%95.75%95.75%95.75%
IDBO-Catboost96.21%96.10%96.10%96.10%
GWO-OCSVM95.45%95.38%95.38%95.38%
PSO-ONE-SVM95.62%95.55%95.55%95.55%

Table 7 Experimental Comparison of Various Models on BotIoT.

MethodsPrecisionRecallAccuracyF1-Score
Catboost94.38%94.25%94.25%94.25%
BO-GP-DT96.73%96.68%96.68%96.68%
BO-LGBM97.10%97.06%97.06%97.06%
DBO-Catboost98.13%98.12%98.12%98.12%
IDBO-Catboost98.62%98.57%98.57%98.57%
GWO-OCSVM96.54%96.50%96.50%96.50%
PSO-ONE-SVM97.08%97.01%97.01%97.01%

Table 8 Average time.

DatasetAverage Time(s)
IDBO-CatboostDBO-CatboostBO-GP-DTBO-LGBMGWO-OCSVMPSO-ONE-SVMCatboost
Botnet38.2139.8446.7545.3147.8246.5251.89
BotIoT20.1923.4431.6727.0530.7028.5537.42

Author Contributions

Conceptualization, C.Y.; Writing—original draft, C.Y.; experiment, C.Y.; resources, C.Y.; formal analysis, C.Y. and W.G.; project running, W.G. and Z.F.; supervision, W.G and Z.F.; funding acquisition, Z.F. All authors have read and agreed to the published version of the manuscript.

Data Availability Statement

The dataset used can be located at https://research.unsw.edu.au/projects/bot-iot-dataset (accessed on 20 April 2023) and https://www.unb.ca/cic/datasets/botnet.html (accessed on 22 April 2023).

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes 1 Disclaimer/Publisher's Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. References Zemrane H., Baddi Y., Hasbi A. Internet of things smart home ecosystem. Emerg. Technol. Connect. Internet Veh. Intell. Transp. Syst. Netw. Emerg. Technol. Connect. Smart Veh. 2020; 242: 101-125 2 Sakhnini J., Karimipour H., Dehghantanha A., Parizi R.M., Srivastava G. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet Things. 2021; 14: 100111. 10.1016/j.iot.2019.100111 3 Solmaz G., Wu F.J., Cirillo F., Kovacs E., Santana J.R., Sánchez L., Sotres P., Munoz L. Toward understanding crowd mobility in smart cities through the internet of things. IEEE Commun. Mag. 2019; 57: 40-46. 10.1109/MCOM.2019.1800611 4 Wang T., Luo H., Jia W., Liu A., Xie M. MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things. IEEE Trans. Ind. Inform. 2019; 16: 2054-2062. 10.1109/TII.2019.2930286 5 Cisco. Cisco Annual Internet Report (2018–2023) White Paper; Cisco: Singapore. 2020; Volume 10: 1-35 6 Zhang Y., Zhou W., Peng A. Survey on Internet of Things Security. J. Comput. Res. Dev. 2017; 54: 2130-2143 7 Madakam S., Lake V., Lake V., Lake V. Internet of Things (IoT): A literature review. J. Comput. Commun. 2015; 3: 164. 10.4236/jcc.2015.35021 8 Antonakakis M., April T., Bailey M., Bernhard M., Bursztein E., Cochran J., Durumeric Z., Halderman J.A., Invernizzi L., Kallitsis M. Understanding the mirai botnet. Proceedings of the 26th {USENIX} Security Symposium ({USENIX} Security 17). Baltimore, MD, USA. 15–17 August 2018: 1093-1110 9 Vlajic N., Zhou D. IoT as a land of opportunity for DDoS hackers. Computer. 2018; 51: 26-34. 10.1109/MC.2018.3011046 Wazzan M., Algazzawi D., Bamasaq O., Albeshri A., Cheng L. Internet of Things botnet detection approaches: Analysis and recommendations for future research. Appl. Sci. 2021; 115713. 10.3390/app11125713 Kolias C., Kambourakis G., Stavrou A., Voas J. DDoS in the IoT: Mirai and other botnets. Computer. 2017; 50: 80-84. 10.1109/MC.2017.201 Bertino E., Islam N. Botnets and internet of things security. Computer. 2017; 50: 76-79. 10.1109/MC.2017.62 Ryu S., Yang B. A comparative study of machine learning algorithms and their ensembles for botnet detection. J. Comput. Commun. 2018; 6: 119. 10.4236/jcc.2018.65010 Xiao Q., Su K. Botnet Traffic Detection Based on Random Forest. Microelectron. Comput. 2019; 36: 43-47. 10.19304/j.cnki.issn1000-7180.2019.03.009 Pei L., Lin M., Luo Y., Xu B. Botnet Detection Method Based on Light GBM. Electron. Inf. Count. Easure Technol. 2020; 35: 79-84 Alshamkhany M., Alshamkhany W., Mansour M., Khan M., Dhou S., Aloul F. Botnet attack detection using machine learning. Proceedings of the 2020 14th International Conference on Innovations in Information Technology (IIT). Dubai, United Arab Emirates. 17–18 November 2020; IEEE: Piscataway, NJ, USA. 2020: 203-208 Biradar A.D., Padmavathi B. BotHook: A supervised machine learning approach for botnet detection using DNS query data. Proceedings of the ICCCE 2019: 2nd International Conference on Communications and Cyber Physical Engineering. Pune, India. 15–18 February 2019; Springer: Singapore. 2020: 261-269 Injadat M.N., Moubayed A., Shami A. Detecting botnet attacks in IoT environments: An optimized machine learning approach. Proceedings of the 2020 32nd International Conference on Microelectronics (ICM). Aqaba, Jordan. 14–17 December 2020; IEEE: Piscataway, NJ, USA. 2020: 1-4 Vishwakarma A.R. Network Traffic Based Botnet Detection Using Machine Learning. Master's Thesis; San José State University: San Jose, CA, USA. 2020 Al Shorman A., Faris H., Aljarah I. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. J. Ambient Intell. Humaniz. Comput. 2020; 11: 2809-2825. 10.1007/s12652-019-01387-y Salam M.A. Intelligent system for IoT botnet detection using SVM and PSO optimization. J. Intell. Syst. Internet Things. 2021; 3: 68-84. 10.54216/JISIoT.030203 Alharbi A., Alsubhi K. Botnet detection approach using graph-based machine learning. IEEE Access. 2021; 9: 99166-99180. 10.1109/ACCESS.2021.3094183 Maudoux C., Boumerdassi S., Barcello A., Renault E. Combined Forest: A New Supervised Approach for a Machine-Learning-Based Botnets Detection. Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM). Madrid, Spain. 7–11 December 2021; IEEE: Piscataway, NJ, USA. 2021: 1-6 Krishnan D., Babu P. An Adaptive Weighted Voting Classifier for Botnet Detection in Internet of Things. Proceedings of the 2021 IEEE 18th India Council International Conference (INDICON). Guwahati, India. 19–21 December 2021; IEEE: Piscataway, NJ, USA. 2021: 1-6 Shen Q., Tu Z., Li K., Qin Y.J., Zhou H.C. Online botnet detection method based on ensemble learning. Appl. Res. Comput. 2022; 39: 1845-1851 Maurya S., Kumar S., Garg U., Kumar M. An efficient framework for detection and classification of IoT botnet traffic. ECS Sens. Plus. 2022; 1: 026401. 10.1149/2754-2726/ac7abc Waqas M., Kumar K., Laghari A.A., Saeed U., Rind M.M., Shaikh A.A., Qazi A.Q. Botnet attack detection in Internet of Things devices over cloud environment via machine learning. Concurr. Comput. Pract. Exp. 2022; 34: e6662. 10.1002/cpe.6662 Wang J., Ma Z. DGA Botnet Det ection Based on Artificial Neural Networks. Inf. Technol. Informatiz. 2022; 262: 205-208 Gong D., Liu Y. A Mechine Learning Approach for Botnet Detection Using LightGBM. Proceedings of the 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). Changchun, China. 20–22 May 2022; IEEE: Piscataway, NJ, USA. 2022: 829-833 Deng Y., Jiang H., Wu J., Luo W. IoT Botnet Detection Based on Graph Neural Networks. J. Wuhan Univ. (Eng. Sci. Ed.). 2023; 56: 371-378. 10.14188/j.1671-8844.2023-03-014 Dorogush A.V., Ershov V., Gulin A. CatBoost: Gradient boosting with categorical features support. arXiv. 2018. 1810.11363 Xue J., Shen B. Dung beetle optimizer: A new meta-heuristic algorithm for global optimization. J. Supercomput. 2022; 79: 7305-7336. 10.1007/s11227-022-04959-6 Rahnamayan S., Jesuthasan J., Bourennani F., Salehinejad H., Naterer G.F. Computing opposition by involving entire population. Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC); IEEE: Piscataway, NJ, USA. 2014: 1800-1807 Yang L., Shami A. On hyperparameter optimization of machine learning algorithms: Theory and practice. Neurocomputing. 2020; 415: 295-316. 10.1016/j.neucom.2020.07.061 Beigi E.B., Jazi H.H., Stakhanova N., Ghorbani A.A. Towards effective feature selection in machine learning-based botnet detection approaches. Proceedings of the 2014 IEEE Conference on Communications and Network Security. San Francisco, CA, USA. 29–31 October 2014; IEEE: Piscataway, NJ, USA. 2014: 247-255 Roweis S. EM algorithms for PCA and SPCA. Proceedings of the 10th International Conference on Neural Information Processing Systems. New Orleans, LA, USA. 1–3 October 1997: 626-632 Koroniotis N., Moustafa N., Sitnikova E., Turnbull B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 2019; 100: 779-796. 10.1016/j.future.2019.05.041

By Changjin Yang; Weili Guan and Zhijie Fang

Reported by Author; Author; Author

Titel:
IoT Botnet Attack Detection Model Based on DBO-Catboost
Autor/in / Beteiligte Person: Yang, Changjin ; Guan, Weili ; Fang, Zhijie
Link:
Zeitschrift: Applied Sciences, Jg. 13 (2023-06-01), Heft 12, S. 7169-7169
Veröffentlichung: MDPI AG, 2023
Medientyp: academicJournal
ISSN: 2076-3417 (print)
DOI: 10.3390/app13127169
Schlagwort:
  • IoT
  • botnet
  • catboost
  • dung beetle optimizer
  • Technology
  • Engineering (General). Civil engineering (General)
  • TA1-2040
  • Biology (General)
  • QH301-705.5
  • Physics
  • QC1-999
  • Chemistry
  • QD1-999
Sonstiges:
  • Nachgewiesen in: Directory of Open Access Journals
  • Sprachen: English
  • Collection: LCC:Technology ; LCC:Engineering (General). Civil engineering (General) ; LCC:Biology (General) ; LCC:Physics ; LCC:Chemistry
  • Document Type: article
  • File Description: electronic resource
  • Language: English

Klicken Sie ein Format an und speichern Sie dann die Daten oder geben Sie eine Empfänger-Adresse ein und lassen Sie sich per Email zusenden.

oder
oder

Wählen Sie das für Sie passende Zitationsformat und kopieren Sie es dann in die Zwischenablage, lassen es sich per Mail zusenden oder speichern es als PDF-Datei.

oder
oder

Bitte prüfen Sie, ob die Zitation formal korrekt ist, bevor Sie sie in einer Arbeit verwenden. Benutzen Sie gegebenenfalls den "Exportieren"-Dialog, wenn Sie ein Literaturverwaltungsprogramm verwenden und die Zitat-Angaben selbst formatieren wollen.

xs 0 - 576
sm 576 - 768
md 768 - 992
lg 992 - 1200
xl 1200 - 1366
xxl 1366 -