Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
What if I say you that your IoT devices are deceiving you?
A botnet is an âinternetâ of compromised systems which are controlled by the âherderâ(owner of botnet). The systems can be compromised by any kind of malware which is executed in your system and allows someone else to control your system. Your may look to be working fine but in actual it may not!
Botnet attacks on Aug 31,2018 on USA from different parts of the world
You can also watch my video after reading this article to have a clearer understanding of prevention of botnet attacks using AI.
IoT Botnets:
An interconnected system of compromised IoT devices. These can include compromised CCTV cameras, cell phones, AC..etc.
What can Botnets do
- Stealing and sending your personal data to someone else.
- Deleting your data
- Youâll we monitored by your devices!
- You may loose access of your device completely.
- Launching Attacks: Botnets can generate huge floods of traffic to overwhelm the target. These floods can be generated in many ways such as sending more requests to a server than it can handle or having computers send victim a huge amount of data. Some attacks are so big that they can max out a countryâs international bandwidth capacity.
- Can be used to influence political events
Some of the infamous Botnets
- Bashlite: Also know as Gayfgt, discovered in 2014, this botnet controlled over 100,000 electronic devices
- Mirai: Gaining worldwide attention in 2016, this botnet attacked Krebs, OVH, Dyn generated traffic volume above 1Tbps!.
Dataset Info:
Weâll use Logistic Regression to solve this problem.
The dataset used contains 75000+ samples with 0/1 as ouput. 0 denotes that the data from IoT device isnât any type of attack. 1 denotes that it could be a tcp/ip flood, spam/junk data.
I downloaded the dataset from UCI Machine Learning Repository and is used by this Research paper.
[1805.03409] N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders
The Dataset contains 115 features and hence Iâll explain you not what each feature is but how this features are generated.
Attribute Information:H: Stats summarizing the recent traffic from this packetâs host (IP) HH: Stats summarizing the recent traffic going from this packetâs host (IP) to the packetâs destination host. HpHp: Stats summarizing the recent traffic going from this packetâs host+port (IP) to the packetâs destination host+port. Example 192.168.4.2:1242 -> 192.168.4.12:80 HH_jit: Stats summarizing the jitter of the traffic going from this packetâs host (IP) to the packetâs destination host.
How much recent history of the stream is capture in these statistics L5, L3, L1, L0, L0.1
- The statistics extracted from the packet stream: weight: The weight of the stream (can be viewed as the number of items observed in recent history) mean: mean of the two streams.std: standard deviation of two streams.radius: The root squared sum of the two streamsâ variances.magnitude: The root squared sum of the two streamsâ means cov: an approximated covariance between two streams pcc: an approximated covariance between two streams
Platform:
I use Deep Learning Studioâs Jupyter Notebooks to train my model on this dataset. It actually comes pre-configured with all the ML/DL frameworks. If you donât know about it, please check out this.
Iris genus classification|DeepCognition| Azure ML studio
Different Environments on Deep Learning Studio
Code:
Thanks for giving your precious time for reading my article. If you really liked it, do share and clap đ.
Please Subscribe to my YouTube channel Follow me on medium and LinkedIn.
Happy Deep Learning.
- Manik Soni - Medium
- Manik Soni - Machine Learning Intern - HEAD Infotech India Pvt ltd - Ace2three.com | LinkedIn
Prevent IoT Botnet Attacks Using AI with Code. was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.