AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (664.6 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

An Efficient Quantum Enabled Machine Algorithm by Universal Features for Predicting Botnet Attacks in Digital Twin Enabled IoT Networks

Department of ECE, Koneru Lakshmaiah Education Foundation, Vijayawada 520002, India
School of Computer Science and Artificial Intelligence, SR University, Warangal 506371, India
Department of Electronics & Communication Engineering, Siddhartha Institute of Technology & Sciences, Hyderabad 500091, India
Department of CSE, Chaitanya Bharathi Institute of Technology, Proddatur 520002, India
Department of ECE, Seshadri Rao Gudlavalleru Engineering College, Proddatur 520002, India
Show Author Information

Abstract

In this manuscript, the authors introduce a quantum enabled Reinforcement Algorithm by Universal Features (REMF) as a lightweight solution designed to identify and assess the impact of botnet attacks on 5G Internet of Things (IoT) networks. REMF’s primary objective is the swift detection of botnet assaults and their effects, aiming to prevent the initiation of such attacks. The algorithm introduces a novel adaptive classification boosting through reinforcement learning, training on values derived from universal features extracted from network transactions within a given training corpus. During the prediction phase, REMF assesses the Botnet attack confidence of feature values obtained from unlabeled network transactions. It then compares these botnet attack confidence values with the botnet attack confidence of optimal features derived during the training phase to predict the potential impact of the botnet attack, categorizing it as high, moderate, low, or not-an-attack (normal). The performance evaluation results demonstrate that REMF achieves the highest decision accuracy, displaying maximum sensitivity and specificity in predicting the scope of botnet attacks at an early stage. The experimental study illustrates that REMF outperforms existing detection techniques for predicting botnet attacks.

References

[1]
A. Blanter and M. Holman, Internet of things 2020: A glimpse into the future, https://www.readkong.com/page/internet-of-things-2020-a-glimpse-into-the-future-9302560, 2020.
[2]

E. Bertino and N. Islam, Botnets and Internet of Things security, Computer, vol. 50, no. 2, pp. 76–79, 2017.

[3]
V. H. Bezerra, V. G. T. Da Costa, S. B. Junior, R. S. Miani, and B. B. Zarpelão, One-class classification to detect botnets in IoT devices, in Proc. 18 th Brazilian Symp. Information and Computational Systems Security, Natal, Brazil, 2018, pp. 43–56.
[4]
M. Guller, Big Data Analytics with Spark : A Practitioner’s Guide to Using Spark for Large Scale Data Analysis. Berkeley, CA, USA: Apress, 2015.
[5]
S. Homayoun, M. Ahmadzadeh, S. Hashemi, and A. Dehghantanha, BoTShark: A deep learning approach for botnet traffic detection, in Cyber Threat Intelligence, A. Dehghantanha, M. Conti, and T. Dargahi, eds. Cham, Switzerland: Springer, 2018, pp. 137–153.
[6]

O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, Data randomization and cluster-based partitioning for botnet intrusion detection, IEEE Trans. Cybern., vol. 46, no. 8, pp. 1796–1806, 2016.

[7]
H. P. Joshi, M. Bennison, and R. Dutta, Collaborative botnet detection with partial communication graph information, in Proc. 2017 IEEE 38 th Sarnoff Symp., Newark, NJ, USA, 2017, pp. 1–6.
[8]
A. O. Prokofiev, Y. S. Smirnova, and V. A. Surov, A method to detect Internet of Things botnets, in Proc. 2018 IEEE Conf. Russian Young Researchers in Electrical and Electronic Engineering (EIConRus ), Moscow and St. Petersburg, Russia, 2018, pp. 105–108.
[9]
Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders, IEEE Pervasive Comput., vol. 17, no. 3, pp. 12–22, 2018.
[10]
I. Hafeez, A. Y. Ding, M. Antikainen, and S. Tarkoma, Real-time IoT device activity detection in edge networks, in Proc. 12 th Int. Conf. Network and System Security, Hong Kong, China, 2018, pp. 221–236.
[11]

N. Moustafa, B. Turnbull, and K. K. R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things, IEEE Internet Things J, vol. 6, no. 3, pp. 4815–4830, 2019.

[12]

V. Paxson, Bro: A system for detecting network intruders in real-time, Comput. Network., vol. 31, nos. 23&24, pp. 2435–2463, 1999.

[13]
N. Moustafa and J. Slay, UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), in Proc. 2015 Military Communications and Information Systems Conf. (MilCIS ), Canberra, Australia, 2015, pp. 1–6.
[14]

F. Haddadi and A. N. Zincir-Heywood, Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification, IEEE Syst. J., vol. 10, no. 4, pp. 1390–1401, 2016.

[15]

C. Mangla, S. Rani, N. M. F. Qureshi, and A. Singh, Mitigating 5G security challenges for next-gen industry using quantum computing, J. King Saud Univ.-Comput. Inf. Sci., vol. 35, no. 6, p. 101334, 2023.

Tsinghua Science and Technology
Pages 947-956
Cite this article:
Babu KR, Venkatesh N, Shashidhar K, et al. An Efficient Quantum Enabled Machine Algorithm by Universal Features for Predicting Botnet Attacks in Digital Twin Enabled IoT Networks. Tsinghua Science and Technology, 2025, 30(3): 947-956. https://doi.org/10.26599/TST.2024.9010052

657

Views

186

Downloads

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 27 November 2023
Revised: 19 January 2024
Accepted: 04 March 2024
Published: 30 December 2024
© The Author(s) 2025.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return