Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning

The Industrial Revolution 4.0 began with the breakthrough technological advances in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from digitalization and automation to the new era of smart factories. A smart factory can do not only more than just produce products in a digital and automatic system, but also is able to optimize the production on its own by integrating production with process management, service distribution, and customized product requirement. A big challenge to the smart factory is to ensure that its network security can counteract with any cyber attacks such as botnet and Distributed Denial of Service, They are recognized to cause serious interruption in production, and consequently economic losses for company producers. Among many security solutions, botnet detection using honeypot has shown to be effective in some investigation studies. It is a method of detecting botnet attackers by intentionally creating a resource within the network with the purpose of closely monitoring and acquiring botnet attacking behaviors. For the first time, a proposed model of botnet detection was experimented by combing honeypot with machine learning to classify botnet attacks. A mimicking smart factory environment was created on IoT device hardware configuration. Experimental results showed that the model performance gave a high accuracy of above 96%, with very fast time taken of just 0.1 ms and false positive rate at 0.24127 using random forest algorithm with Weka machine learning program. Hence, the honeypot combined machine learning model in this study was proved to be highly feasible to apply in the security network of smart factory to detect botnet attacks.

[1]  Ankit Kumar Jain,et al.  A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[2]  Ray Y. Zhong,et al.  A roadmap for Assembly 4.0: self-configuration of fixed-position assembly islands under Graduation Intelligent Manufacturing System , 2020, Int. J. Prod. Res..

[3]  Jin Kwak,et al.  System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats , 2018, KSII Trans. Internet Inf. Syst..

[4]  Kuan-Ching Li,et al.  SNPL: One Scheme of Securing Nodes in IoT Perception Layer , 2020, Sensors.

[5]  Weizhe Zhang,et al.  An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks , 2020, IEEE Internet of Things Journal.

[6]  Ashraf Aziz A Soft-Decision Fusion Approach for Multiple-Sensor Distributed Binary Detection Systems , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[7]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[8]  David Romero,et al.  Smart manufacturing: Characteristics, technologies and enabling factors , 2019 .

[9]  Azween Abdullah,et al.  A Review on Honeypot-based Botnet Detection Models for Smart Factory , 2020, International Journal of Advanced Computer Science and Applications.

[10]  Seong-Taek Park,et al.  A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning , 2018, J. Ambient Intell. Humaniz. Comput..

[11]  Marco Antonio Sotelo Monge,et al.  Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics , 2020, Italian National Conference on Sensors.

[12]  Athanasios V. Vasilakos,et al.  Software-Defined Industrial Internet of Things in the Context of Industry 4.0 , 2016, IEEE Sensors Journal.

[13]  Yannick Chevalier,et al.  Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models , 2020, Simul. Model. Pract. Theory.

[14]  Azween Abdullah,et al.  Early detection of crypto-ransomware using pre-encryption detection algorithm , 2020, Journal of King Saud University - Computer and Information Sciences.

[15]  Lei Shu,et al.  Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges , 2018, IEEE Access.

[16]  Ercan Öztemel,et al.  Literature review of Industry 4.0 and related technologies , 2018, J. Intell. Manuf..

[17]  Sven Dietrich,et al.  Detecting zero-day attacks using context-aware anomaly detection at the application-layer , 2017, International Journal of Information Security.

[18]  Employing Recent Technologies for Improved Digital Governance , 2020, Advances in Electronic Government, Digital Divide, and Regional Development.

[19]  Gürkan Gür,et al.  Software-Defined Edge Defense Against IoT-Based DDoS , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).

[20]  Emad Jafari,et al.  An intelligent botnet blocking approach in software defined networks using honeypots , 2020, Journal of Ambient Intelligence and Humanized Computing.

[21]  Mooi Choo Chuah,et al.  Detection and Classification of Different Botnet C&C Channels , 2011, ATC.

[22]  Jiafu Wan,et al.  Adaptive Transmission Optimization in SDN-Based Industrial Internet of Things With Edge Computing , 2018, IEEE Internet of Things Journal.

[23]  Chee Keong Kwoh,et al.  A Feature Subset Selection Method Based On High-Dimensional Mutual Information , 2011, Entropy.

[24]  Michael Schukat,et al.  A ZigBee honeypot to assess IoT cyberattack behaviour , 2017, 2017 28th Irish Signals and Systems Conference (ISSC).

[25]  Mérouane Debbah,et al.  Distributed Binary Detection With Lossy Data Compression , 2016, IEEE Transactions on Information Theory.

[26]  Prachi Ahlawat,et al.  Botnet Detection via mining of network traffic flow , 2018 .

[27]  Yidong Li,et al.  BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..

[28]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[29]  Nz Jhanjhi,et al.  Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique , 2019, IEEE Access.

[30]  Martin Horauer,et al.  Binary protection framework for embedded systems , 2017, 2017 12th IEEE International Symposium on Industrial Embedded Systems (SIES).

[31]  Noor Zaman,et al.  A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.