Efficient Botnet Attack Detection in IOT Environments Using Hybrid Machine Learning Model

Authors

  • Mamatha M.C.A Student, Department of M.C.A, KMMIPS, Tirupati(D.t), Andhra Pradesh, India Author
  • G. V.S Ananthanath Assistant Professor, Department of M.C.A, KMMIPS, Tirupati(D.t), Andhra Pradesh, India Author

Keywords:

Botnet Detection, Hybrid Machine Learning, Random Forest, Internet of Things (IoT), Cybersecurity, Receiver, Operating Characteristic (ROC) Curve, Precision-Recall (PR) Curve

Abstract

As technology becomes more integrated into our daily lives, the security of ongoing operating complex interconnected systems has become quite paramount. This is, therefore, one of the most astonishing threats: The botnet attacks are directed against vulnerable devices to cooperate together for some malicious purposes. This paper presents a concrete and highly scalable botnet activities detection in IoT environment with machine learning. The Random Forest algorithm has been adopted as it is considered robust and efficient with complex, high-dimensional data concerning network traffic. The detection model is successfully integrated into a user-friendly graphical web interface, which is developed using HTML, CSS, JavaScript, and with Flask used as a backend framework. This setup guarantees smooth interaction, efficient model deployment, and enables real-time analysis. This configuration emerges as a machine learning solution based on web-related technologies that facilitate the enhancement of IoT security and mitigation of related botnet threats.

📊 Article Downloads

References

A. G. Diro and N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, vol. 82, pp. 761–768, May 2018, doi: 10.1016/j.future.2017.08.043.

A. Mosenia and N. K. Jha, "A comprehensive study of security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct.–Dec. 2017,

M. Meidan et al., "Detection of unauthorized IoT devices using machine learning techniques," arXiv preprint, arXiv:1709.04647, 2017.

Y. Meidan, M. Bohadana, Y. Mathov, and A. Shabtai, "N-BaIoT—Network-based detection of IoT botnet attacks using deep autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Jul.–Sep. 2018, doi: 10.1109/MPRV.2018.03367731.

N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in Proc. Military Communications and Information Systems Conf. (MilCIS), 2015, pp. 1–6, doi: 10.1109/MilCIS.2015.7348942.

J. R. Campos and C. R. Jung, "Detection of botnets using machine learning techniques and network traffic characteristics," in Proc. IEEE Int. Conf. Commun. (ICC), 2020, pp. 1–6, doi: 10.1109/ICC40277.2020.9149107.

A. Vinayakumar, K. P. Soman, and P. Poornachandran, "Evaluating deep learning approaches to characterize and classify network traffic," Procedia Computer Science, vol. 132, pp. 802–809, 2018, doi: 10.1016/j.procs.2018.05.173.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools," IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303–336, First Quarter 2014,

S. T. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046–2069, 2013,

N. McKeown et al., "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, Apr. 2008,

Downloads

Published

21-07-2025

Issue

Section

Research Articles

How to Cite

[1]
Mamatha and G. V.S Ananthanath, “Efficient Botnet Attack Detection in IOT Environments Using Hybrid Machine Learning Model”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 4, pp. 205–213, Jul. 2025, Accessed: Jul. 31, 2025. [Online]. Available: https://www.ijsrcseit.com/index.php/home/article/view/CSEIT2511157