4.5 Article

Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms

Journal

COMPUTERS & SECURITY
Volume 135, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2023.103456

Keywords

Botnet attack; Machine learning; Intrusion detection; STRIDE; AMI

Ask authors/readers for more resources

This study proposes an efficient method called AdKNN for botnet classification in AMI networks, which is demonstrated to outperform existing state-of-the-art models through extensive experiments.
STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of privilege) in advance metering infrastructure (AMI) and cloud computing have been confronted with numerous botnet attacks within the IoT systems. Botmasters aid botnets in engineering their operations by changing the codes and updating the bots to continue to thwart the recent detection schemes. The study proposed AdKNN, a composition of k's nearest neighbour, an enhanced Adam's optimiser in this paper. The KNN in AdKNN is for the early detection of the botnet within the AMI networks, while the new Adam-based optimiser is responsible for optimising AdKNN. An extensive experiment has demonstrated that our model AdKNN is efficient and effective for botnet classification in AMI networks on the publicly available dataset for IoT-botnet detection evaluated on AMI network dataset compared to existing state-of-the-art (SOTA) models. Performance-wise, AdKNN achieves the highest overall accuracy of 99% with 99% precision and low false positives in an appreciable minimal training time.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available