Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System †
Abstract
:1. Introduction
- (1)
- The concept of zoning is introduced to grasp malicious botnets’ spread with bias over IoT networks.
- (2)
- Tactical response by zone is proposed to build and operate white-hat botnets efficiently and effectively against the malicious botnets.
- (3)
- The effect of our white-hat Worm Launcher for BDS is confirmed through simulation evaluation with agent-oriented Petri nets. The result show that the proposed Launcher can reduce the number of infected IoT devices by about 30%.
2. Related Work
2.1. Previous Work
2.2. Botnet Defense System
Procedure 1 Worm-Launcher. |
Input: Mirai bots’ distribution in network N, machine learning model to decide tactics, machine learning model to place white-hat worms Output: White-hat worms’ placement for ▷ Step 1: Divide Stage 1: Divide N into n subnetworks , , ⋯, by network scale ▷ Step 2: Conquer Stage 2: for each subnetwork in , , ⋯, do 3: Use to decide a tactic for 4: Use to make white-hat worms’ placement on based on 5: end for ▷ Step 3: Combining Stage 6: Combine , , ⋯, with the whole placement 7: Output and stop. |
- Step 1 divides the network into subnetworks by the network scale. Assume n = 4 in this example. That is, the 10 × 10 network is divided into four 25 × 25 subnetworks.
- Step 2 predicts a tactic with and, then, the white-hat worms’ placement based on the tactic with for each subnetwork.
- Step 3 combines the predictions of all subnetworks into the final white-hat worm’s placement.
3. White-Hat Worm Launcher for Tactical Response by Zoning
3.1. Zoning
- Danger Zone : contains a cluster C such that is (). Almost all devices in this zone are infected by Mirai.
- Safe Zone : contains a cluster C such that () . Almost no devices in this zone are infected.
- Unknown Zone : contains a cluster C such that is . The devices in this zone are at risk of being infected.
Procedure 2 DBSCAN-based-Zoning . |
Input: Mirai bots’ distribution in network N, normal devices’ distribution on N. Output: Danger Zone , Safe Zone , Unknown Zone . ▷ Step 1: Finding Danger Zone 1: . 2: , ⋯, . 3: . 4: for each cluster C in , ⋯, do 5: if then 6: . 7: end if 8: end for ▷ Step 2: Finding Safe Zone 9: . 10: , ⋯, . 11: . 12: for each cluster C in , ⋯, do 13: if then 14: . 15: end if 16: end for ▷ Step 3: Finding Unknown Zone 17: . ▷ Step 4 18: Output , , and stop. |
- Step 2 finds the Safe Zone. As a result of DBSCAN with and , we obtain one cluster (blue area in the left of Figure 3b). For , since , the cluster becomes the Safe Zone, i.e., .
- Step 3 finds the Unknown Zone. The remaining areas comprise (yellow areas of Figure 3b).
- Step 4 outputs , , as the Danger, Safe, and Unknown Zones.
3.2. Tactics by Zone
3.2.1. Surrounding Tactic for Danger Zone
3.2.2. Protecting Tactic for Safe Zone
3.2.3. Machine Learning Tactic for Unknown Zone
3.3. White-Hat Worm Launcher by Zoning
- Step 1 divides the network into three zones by using Procedure DBSCAN-based-Zoning. As stated before, we obtain the result of zoning shown in Figure 3b.
- Step 2 places white-hat worms in each zone. Each zone takes a different tactic, i.e., the surrounding tactic for the Danger Zone, the protecting tactic for the Safe Zone, and the machine learning tactic for the Unknown Zone.
- Step 3 combines those results for the whole placement.
Procedure 3 Zoning-based-Worm-Launcher. |
Input: Mirai bots’ distribution in network N, normal devices’ distribution on N, machine learning model to place white-hat worms . Output: White-hat worms’ placement for . ▷ Step 1: Zoning Stage 1: , , ←DBSCAN-based-Zoning. ▷ Step 2: Placing Stage 2: for each zone Z in , , do 3: Place white-hat worms as follows: 4: if Z is then 5: Use the surrounding tactic and store the placement result in . 6: end if 7: if Z is then 8: Use the protecting tactic and store the placement result in . 9: end if 10: if Z is then 11: Use the machine Learning tactic and store the placement result predicted by in . 12: end if 13: end for ▷ Step 3: Combining Stage 14: Combine , , with the whole placement . 15: Output and stop. |
4. Simulation Evaluation
4.1. Experiment
- Distribution 1: Has a low density of Mirai bots in the whole network, i.e., . This is illustrated in Figure 8a. The infected network is divided into 25% Danger Zone, 50% Safe Zone, and 25% Unknown Zone.
- Distribution 2: Has a medium density of Mirai bots in the whole network, i.e., . This is illustrated in Figure 8b. The infected network is divided into 25% Danger Zone, 25% Safe Zone, and 50% Unknown Zone.
- Distribution 3: Has a high density of Mirai bots in the whole network, i.e., . This is illustrated in Figure 8c. The infected network is divided into 50% Danger Zone, 25% Safe Zone, and 25% Unknown Zone.
- Distribution 4: Set to be random. It has almost the same density as Distribution 1, i.e., ; unlike Distribution 1, all the Mirai bots are placed randomly.
- Lifespan ℓ = 2;
- Delay time = 7 until rebooting;
- Secondary infection probability = 50%.
4.2. Simulation Result
4.3. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Vishwakarma, R.; Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 2020, 73, 3–25. [Google Scholar] [CrossRef]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J. Understanding the mirai botnet. In Proceedings of the 26th USENIX Security Symposium (SEC‘17), Ancouver, BC, Canada, 16–18 August 2017. [Google Scholar]
- Margolis, J.; Oh, T.T.; Jadhav, S.; Bernhard, M.; Kim, Y.H.; Kim, J.N. An indepth analysis of the mirai botnet. In Proceedings of the 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USA, 1 July 2017. [Google Scholar]
- Marzano, A.; Alexander, D.; Fonseca, O.L.H.M.; Fazzion, E.C.; Hoepers, C.; Jessen, K. The evolution of bashlite and mirai iot botnets. In Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC), Altoona, PA, USA, 1 June 2018. [Google Scholar]
- OVH Suffers 1.1 Tbps DDoS Attack. Available online: Https://www.scmagazine.com/news/ddos/ovh-suffers-massive-1-1tbps-ddos-attack (accessed on 27 September 2016).
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030|Statista. Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (accessed on 17 March 2022).
- Edwards, S.; Profetis, I. Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Netw. 2016, 16, 1–18. [Google Scholar]
- Yamaguchi, S. White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets. Sensors 2020, 20, 556. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yamaguchi, S. Botnet Defense System: Concept, Design, and Basic Strategy. Information 2020, 11, 516. [Google Scholar] [CrossRef]
- Yamaguchi, S.; Ahmadon, M.A.B.; Ge, Q.W. Introduction of Petri nets: Its applications and security challenges. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; Gupta, B.B., Agrawal, D.P., Yamaguchi, S., Eds.; IGI Publishing: Hershey, PA, USA, 2016; pp. 145–179. [Google Scholar]
- Pan, X.; Yamaguchi, S.; Kageyama, T.; Kamlin, M.H.B. Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System. Int. J. Softw. Sci. Comput. Intell. 2022, 14, 1–14. [Google Scholar] [CrossRef]
- Wazzan, M.; Algazzawi, D.; Bamasaq, O.; Albeshri, A.; Cheng, L. Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research. Appl. Sci. 2021, 11, 5713. [Google Scholar] [CrossRef]
- Nagisetty, A.; Gupta, G.P. Framework for detection of malicious activities in iot networks using keras deep learning library. In Proceedings of the 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) IEEE, Surya Engineering College, Erode, India, 27–29 March 2019. [Google Scholar]
- Soe, Y.N.; Feng, Y.; Santosa, P.I.; Hartanto, R.; Sakurai, K. Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 2020, 20, 4372. [Google Scholar] [CrossRef] [PubMed]
- May raju, P.; Gupta, G.P. Intrusion Detection Framework Using an Improved Deep Reinforcement Learning Technique for IoT Network. In Soft Computing for Security Applications; Ranganathan, G., Fernando, X., Shi, F., El Allioui, Y., Eds.; Advances in Intelligent Systems and Computing; Springer: Singapore, 2022; pp. 765–779. [Google Scholar]
- Qu, Z.; Zhang, Y.; Qu, N.; Wang, L.; Li, Y.; Dong, Y. Method for quantitative estimation of the risk propagation threshold in electric power cps based on seepage probability. IEEE Access 2018, 6, 68813–68823. [Google Scholar] [CrossRef]
- Qu, Z.; Bo, X.; Yu, T.; Liu, Y.; Dong, Y.; Kan, Z.; Wang, L.; Li, Y. Active and passive hybrid detection method for power CPS false data injection attacks with improved AKF and GRU-CNN. IET Renew. Power Gener. 2022, 16, 1490–1508. [Google Scholar] [CrossRef]
- Wang, L.; Qu, Z.; Li, Y.; Hu, K.; Sun, J.; Xue, K.; Cui, M. Method for extracting patterns of coordinated network attacks on electric power cps based on temporal-topological correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Vishwakarma, R.; Jain, A.K. A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1019–1024. [Google Scholar]
- Guerra-Manzanares, A.; Medina-Galindo, J.; Bahsi, H.; Nmm, S. MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT Network. In Proceedings of the 2020 6th International Conference on Information Systems Security and Privacy (ICISSP), Berlin/Heidelberg, Germany, 25–27 February 2020; pp. 207–218. [Google Scholar]
- María Fernanda Ojeda Adán. Designing an Internet of Things Attack Simulator. Bachelor’s Thesis, Metropolia University of Applied Sciences, Vantaa, Finland, 26 February 2019.
- Sagirlar, G.; Carminati, B.; Ferrari, E. AutoBotCatcher: Blockchain-based P2P botnet detection for the internet of things. In Proceedings of the 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, 18–20 October 2018. [Google Scholar]
- Falco, G.; Li, C.; Fedorov, P.; Caldera, C.; Arora, R.; Jackson, K. Neuromesh: Iot security enabled by a blockchain powered botnetvaccine. In Proceedings of the International Conference on Omni-Layer Intelligent Systems, Crete, Greece, 5–7 May 2019. [Google Scholar]
- Hu, J.W.; Yeh, L.Y.; Liao, S.W.; Yang, C.S. A deep convolutional neural network model to classify heartbeats. Comput. Secur. 2019, 86, 238–252. [Google Scholar] [CrossRef]
- Özçelik, M.; Chalabianloo, N.; Gür, G. Software-defined edge defense against IoT-based DDoS. In Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017. [Google Scholar]
- Gopal, T.S.; Meerolla, M.; Jyostna, G.; Eswari, P.R.L.; Magesh, E. Mitigating Mirai Malware Spreading in IoT Environment. In Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19 September 2018. [Google Scholar]
- Manso, P.; Moura, J. Serrão, C. SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks. Information 2019, 10, 106. [Google Scholar] [CrossRef] [Green Version]
- Ceron, J.M.; Jessen, K.; Hoepers, C.; Granville, L.Z.; Margi, C.B. Improving IoT Botnet Investigation Using an Adaptive Network Layer. Sensors 2019, 19, 727. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ester, M.; Kriegel, H.P.; Sander, J.; Xu, X. A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 1996, 96, 226–231. [Google Scholar]
- Kageyama, T.; Yamaguchi, S. On Tactics to Deploy White-Hat Worms in Botnet Defense System. In Proceedings of the 10th Global Conference on Consumer Electronics (GCCE 2021), Kyoto, Japan, 12–15 October 2021. [Google Scholar]
- Ohsaki, K.; Yamaguchi, S. A Proposal of Heterogeneous White-Hat Botnet in Botnet Defense System. In Proceedings of the Sixth International Conference on Consumer Electronics (ICCE) Asia, Gangneung, Korea, 27–29 October 2021. [Google Scholar]
- Nakahori, K.; Yamaguchi, S. A Support Tool to Design IoT Services with NuSMV. In Proceedings of the 25th International Conference on Consumer Electronics (ICCE 2017), Las Vegas, NV, USA, 4–8 December 2017. [Google Scholar]
- Yamaguchi, S.; Makihara, D. On Resident Strategy for White-Hat Botnet in Botnet Defense System. In Proceedings of the 9th International Conference on Consumer Electronics—Taiwan (ICCE-TW 2022), Taipei, Taiwan, 6–8 July 2022. [Google Scholar]
Authors | Year | Attributes | Limitations | ML Algorithm 1 | Eval. Measure |
---|---|---|---|---|---|
Qu et al. [17] | 2018 | Quantify the security risk in CPS network | No corresponding strategy for risk outbreak | N/A | Failure ratio |
Nagisetty et al. [14] | 2019 | Monitor the network traffic by DL | Over-reliance on IoT traffic dataset | MLP, CNN | RMSE, F1-score |
Vishwakarma et al. [20] | 2019 | Design a honeypot-based ML framework | Adaptability limitation to real-time scenarios | SVM, NB | N/A |
Adan et al. [22] | 2019 | Design an IoT attack simulator | Limitation to public IoT networks | N/A | N/A |
Soe et al. [15] | 2020 | Made sequential classifiers based on ML | Specific botnet can be classified | ANN, DT, NB | ACC |
Guerra-Manzanares et al. [21] | 2020 | Generate traffic dataset of botnet | Low adaptability to real-time network | N/A | N/A |
Wang et al. [19] | 2020 | Mine attack patterns from alarm logs | Lack of adaptability to local attack sequences | NB | ACC |
Qu et al. [18] | 2022 | Detect attacks with AKF and GRU-CNN | Limitations for data loss and external interference | AFK, GRU-CNN | FPR, ACC |
May raju et al. [16] | 2022 | Detect intrusion based on DRL | Compare with only two common ML models | DRL | ACC |
Authors | Year | Attributes | Limitations | Eval. Measure |
---|---|---|---|---|
Gopal et al. [27] | 2018 | Establish a security wall based on white listing | Lack of protection by other mechanisms | Router Model |
Manso et al. [28] | 2019 | Construct a software-defined security system | Cause congestion of DNS controller | Quality of service |
Ceron et al. [29] | 2019 | Modify the malicious traffic at network layer | Lack of dynamic malware analysis | Packet number |
(a) Distribution 1 | ||
---|---|---|
Step | Without Zoning | With Zoning |
1 | 37.11% | 36.97% |
10 | 38.20% | 6.99% |
100 | 38.50% | 31.89% |
1000 | 8.51% | 7.62% |
10,000 | 1.49% | 0.82% |
(b) Distribution 2 | ||
Step | Without Zoning | With Zoning |
1 | 31.03% | 31.01% |
10 | 32.03% | 30.70% |
100 | 31.89% | 20.71% |
1000 | 6.78% | 5.99% |
10,000 | 0.38% | 0.29% |
(c) Distribution 3 | ||
Step | Without Zoning | With Zoning |
1 | 0.0856.07% | 0.0855.89% |
0.0610 | 56.43% | 54.86% |
100 | 2.02% | 45.47% |
1000 | 11.56% | 0.60% |
10,000 | 0.62% | 0.60% |
(d) Distribution 4 | ||
Step | Without Zoning | With Zoning |
1 | 27.96% | 27.82% |
10 | 27.67% | 25.99% |
100 | 18.37% | 12.20% |
1000 | 6.58% | 6.11% |
10,000 | 1.00% | 0.97% |
Authors | Year | Detection | Mitigation | Extermination | Tactics | Zoning |
---|---|---|---|---|---|---|
Qu et al. [17] | 2018 | ✓ | × | × | × | × |
Nagisetty et al. [14] | 2019 | ✓ | × | × | × | × |
Vishwakarma et al. [20] | 2019 | ✓ | × | × | × | × |
Adan et al. [22] | 2019 | ✓ | × | × | × | × |
Soe et al. [15] | 2020 | ✓ | × | × | × | × |
Guerra-Manzanares et al. [21] | 2020 | ✓ | × | × | × | × |
Wang et al. [19] | 2020 | ✓ | × | × | × | × |
Qu et al. [18] | 2022 | ✓ | × | × | × | × |
May raju et al. [16] | 2022 | ✓ | × | × | × | × |
Gopal et al. [27] | 2018 | × | ✓ | × | × | × |
Manso et al. [28] | 2019 | ✓ | ✓ | × | × | × |
Ceron et al. [29] | 2019 | × | ✓ | × | × | × |
Yamaguchi [10] | 2020 | × | × | ✓ | × | × |
Pan et al. [12] | 2022 | × | × | ✓ | ✓ | × |
This study | 2022 | × | × | ✓ | ✓ | ✓ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pan, X.; Yamaguchi, S. Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System. Sensors 2022, 22, 4666. https://doi.org/10.3390/s22134666
Pan X, Yamaguchi S. Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System. Sensors. 2022; 22(13):4666. https://doi.org/10.3390/s22134666
Chicago/Turabian StylePan, Xiangnan, and Shingo Yamaguchi. 2022. "Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System" Sensors 22, no. 13: 4666. https://doi.org/10.3390/s22134666
APA StylePan, X., & Yamaguchi, S. (2022). Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System. Sensors, 22(13), 4666. https://doi.org/10.3390/s22134666