Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
In this manuscript, the authors introduce a quantum enabled Reinforcement Algorithm by Universal Features (REMF) as a lightweight solution designed to identify and assess the impact of botnet attacks on 5G Internet of Things (IoT) networks. REMF’s primary objective is the swift detection of botnet assaults and their effects, aiming to prevent the initiation of such attacks. The algorithm introduces a novel adaptive classification boosting through reinforcement learning, training on values derived from universal features extracted from network transactions within a given training corpus. During the prediction phase, REMF assesses the Botnet attack confidence of feature values obtained from unlabeled network transactions. It then compares these botnet attack confidence values with the botnet attack confidence of optimal features derived during the training phase to predict the potential impact of the botnet attack, categorizing it as high, moderate, low, or not-an-attack (normal). The performance evaluation results demonstrate that REMF achieves the highest decision accuracy, displaying maximum sensitivity and specificity in predicting the scope of botnet attacks at an early stage. The experimental study illustrates that REMF outperforms existing detection techniques for predicting botnet attacks.
E. Bertino and N. Islam, Botnets and Internet of Things security, Computer, vol. 50, no. 2, pp. 76–79, 2017.
O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K. Kim, Data randomization and cluster-based partitioning for botnet intrusion detection, IEEE Trans. Cybern., vol. 46, no. 8, pp. 1796–1806, 2016.
N. Moustafa, B. Turnbull, and K. K. R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things, IEEE Internet Things J, vol. 6, no. 3, pp. 4815–4830, 2019.
V. Paxson, Bro: A system for detecting network intruders in real-time, Comput. Network., vol. 31, nos. 23&24, pp. 2435–2463, 1999.
F. Haddadi and A. N. Zincir-Heywood, Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification, IEEE Syst. J., vol. 10, no. 4, pp. 1390–1401, 2016.
C. Mangla, S. Rani, N. M. F. Qureshi, and A. Singh, Mitigating 5G security challenges for next-gen industry using quantum computing, J. King Saud Univ.-Comput. Inf. Sci., vol. 35, no. 6, p. 101334, 2023.
657
Views
186
Downloads
0
Crossref
0
Web of Science
0
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).