Document Type
Journal Article
Publication Title
Sensors
Volume
24
Issue
3
Publisher
MDPI
School
School of Science / ECU Security Research Institute
RAS ID
64777
Funders
Edith Cowan University
Abstract
A botnet is a collection of Internet-connected computers that have been suborned and are controlled externally for malicious purposes. Concomitant with the growth of the Internet of Things (IoT), botnets have been expanding to use IoT devices as their attack vectors. IoT devices utilise specific protocols and network topologies distinct from conventional computers that may render detection techniques ineffective on compromised IoT devices. This paper describes experiments involving the acquisition of several traditional botnet detection techniques, BotMiner, BotProbe, and BotHunter, to evaluate their capabilities when applied to IoT-based botnets. Multiple simulation environments, using internally developed network traffic generation software, were created to test these techniques on traditional and IoT-based networks, with multiple scenarios differentiated by the total number of hosts, the total number of infected hosts, the botnet command and control (CnC) type, and the presence of aberrant activity. Externally acquired datasets were also used to further test and validate the capabilities of each botnet detection technique. The results indicated, contrary to expectations, that BotMiner and BotProbe were able to detect IoT-based botnets—though they exhibited certain limitations specific to their operation. The results show that traditional botnet detection techniques are capable of detecting IoT-based botnets and that the different techniques may offer capabilities that complement one another.
DOI
10.3390/s24031027
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Comments
Woodiss-Field, A., Johnstone, M. N., & Haskell-Dowland, P. (2024). Examination of traditional botnet detection on Iot-based bots. Sensors, 24(3), article 1027. https://doi.org/10.3390/s24031027