Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System

Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System

Xiangnan Pan, Shingo Yamaguchi, Taku Kageyama, Mohd Hafizuddin Bin Kamilin
DOI: 10.4018/IJSSCI.291713
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.
Article Preview
Top

Introduction

A spree of huge distributed denial-of-service (DDoS) attacks in late 2016 basically changed the threat landscape in Internet security. Notably, the initial attack on Krebs exceeded volumes of 600 Gbps, halt major Internet service suppliers such as OVH and Dyn (Krebs, 2016; Millman, 2016; Moss, 2016). This destructive attack came from hundreds of thousands of Internet of Things (IoT) devices controlled by a brand new botnet named Mirai. The Mirai botnet is a wake-up call to the industry to better secure Internet of Things (IoT) devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service (DDoS) attacks (AsSadhan et al., 2017).

Today, the explosive growth of the Internet of Things market has connected billions of small devices to the Internet. In order to survive in such a rapidly growing market, developers usually ignore security issues and bring vulnerable products to the market. These vulnerabilities can be used for launching large-scale DDoS attacks by Mirai, threatening users' personal information and the company's data assets (Garg & Sharma, 2017; Silva, 2017). With the explosive growth of IoT devices, it is no longer realistic to respond with workforce tactics, and an innovative method is needed to greatly improve defense capabilities.

In this paper, we propose a machine learning-based white-hat worm launcher for Botnet Defense System (BDS). The main contributions of our research are as follows:

  • 1.

    A machine-learning based white-hat worm launcher is designed to predict white-hat worms’

  • 2.

    appropriate positions for BDS.

  • 3.

    In order to apply the launcher to large-scale IoT network, the divide-and-conquer algorithm is proposed to develop the launcher’s scalability.

  • 4.

    To tackle the correlation problem in divide-and-conquer algorithm, the boundary overlapping method is proposed to develop the launcher’s adaptivity.

  • 5.

    The effect of the proposed launcher is evaluated through the simulation of PN2 model.

Remaining part of this paper is organized as follows: Section 2 surveys the related work and BDS. Section 3 presents the launcher’s methodology. Section 4 presents the simulation results and discussion. Section 5 summarizes our key points and gives future work.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing