Table 3: Comparison between algorithms.
Metrics (Meidan et al., 2018)
DenStream
Mean Variance
TPR 100% 97.85% 94.43% ∼ 99.87%
FPR 0.007% ∼ 0.01% 1% 0.01% ∼ 2.48%
Time 174 ∼ 212 ms 20.07 ms 17.99 ∼ 23.96 ms
faster, taking almost 90% less time to differentiate be-
nign and malicious data. Since autoencoder is a neu-
ral network, it has a much costly footprint than Den-
Stream, and need much more data to train also.
7 CONCLUSION
In this paper was showed that more lightweight algo-
rithms, such as DenStream, can be a great candidate
to detect botnet formation, making possible to run this
algorithm in more simple and low-cost devices, such
as a Raspberry Pi 3B+ (used in the experiment). It
also showed that, due to its light and efficient way of
dealing with training and predicting, it could respond
to a threat much sooner.
In this paper was used DenStream as an unsuper-
vised machine learning algorithm, but the CluStream
showed as an option as well. As future work, it will be
tested using the CluStream and will be verified which
one is more effective to the problem.
It will also be studied applications for the algo-
rithm, which can be ported to an IoT specialist device
or inserted in an SDN context. For this, an analysis of
minimum hardware requirements to perform well had
to be made. It will also be studied possibles measures
to apply when the algorithm detects an attack.
REFERENCES
Afghah, F., Cambou, B., Abedini, M., and Zeadally, S.
(2018). A ReRAM Physically Unclonable Function (
ReRAM PUF )- Based Approach to Enhance Authen-
tication Security in Software Defined Wireless Net-
works. International Journal of Wireless Information
Networks, 25(2):117–129.
Akbar, A., Carrez, F., Moessner, K., and Zoha, A. (2015).
Predicting complex events for pro-active iot applica-
tions. In 2015 IEEE 2nd World Forum on Internet of
Things (WF-IoT), pages 327–332.
Akbar, A., Khan, A., Carrez, F., and Moessner, K. (2017).
Predictive analytics for complex IoT data streams.
IEEE Internet of Things Journal, 4(5):1571–1582.
Amza, C., Leordeanu, C., and Cristea, V. (2011). Hybrid
network intrusion detection. In 2011 IEEE 7th Inter-
national Conference on Intelligent Computer Commu-
nication and Processing, pages 503–510.
Axenie, C., Tudoran, R., Bortoli, S., Al Hajj Hassan, M.,
Foroni, D., and Brasche, G. (2018). Starlord: Slid-
ing window temporal accumulate-retract learning for
online reasoning on datastreams. In 2018 17th IEEE
International Conference on Machine Learning and
Applications (ICMLA), pages 1115–1122.
Bhattacharyya, S., Katramatos, D., and Yoo, S. (2018).
Why wait? let us start computing while the data is
still on the wire. Future Generation Computer Sys-
tems, 89:563–574.
Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander,
J. (2000). LOF. In Proceedings of the 2000 ACM
SIGMOD international conference on Management of
data - SIGMOD '00. ACM Press.
Cao, F., Estert, M., Qian, W., and Zhou, A. (2006). Density-
based clustering over an evolving data stream with
noise. In Proceedings of the 2006 SIAM International
Conference on Data Mining. Society for Industrial and
Applied Mathematics.
Dey, A., Ling, X., Syed, A., Zheng, Y., Landowski, B., An-
derson, D., Stuart, K., and Tolentino, M. E. (2016).
Namatad: Inferring occupancy from building sensors
using machine learning. In 2016 IEEE 3rd World Fo-
rum on Internet of Things (WF-IoT). IEEE.
Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C.,
Antzek, M., Sperotto, A., and Pras, A. (2018). IoT-
botnet detection and isolation by access routers. In
2018 9th International Conference on the Network of
the Future (NOF). IEEE.
Donovan, P. O., Gallagher, C., Bruton, K., and Sullivan, D.
T. J. O. (2018). A fog computing industrial cyber-
physical system for embedded low-latency machine
learning industry 4.0 applications. Manufacturing Let-
ters, 15:139–142.
Elkhoukhi, H., NaitMalek, Y., Berouine, A., Bakhouya, M.,
Elouadghiri, D., and Essaaidi, M. (2018). Towards
a real-time occupancy detection approach for smart
buildings. Procedia Computer Science, 134:114–120.
Ester, M., Kriegel, H.-P., Sander, J., and Xu, X. (1996).
A density-based algorithm for discovering clusters in
large spatial databases with noise. In Proceedings of
the Second International Conference on Knowledge
Discovery and Data Mining, KDD’96, page 226–231.
AAAI Press.
Kambourakis, G., Kolias, C., and Stavrou, A. (2017). The
mirai botnet and the IoT zombie armies. In MILCOM
2017 - 2017 IEEE Military Communications Confer-
ence (MILCOM). IEEE.
Kanich, C., Weavery, N., McCoy, D., Halvorson, T.,
Kreibichy, C., Levchenko, K., Paxson, V., Voelker,
G. M., and Savage, S. (2011). Show me the money:
Characterizing spam-advertised revenue. In Proceed-
ings of the 20th USENIX Conference on Security,
SEC’11, page 15, USA. USENIX Association.
Kanoun, K., Tekin, C., Atienza, D., and v. d. Schaar, M.
(2016). Big-data streaming applications scheduling
based on staged multi-armed bandits. IEEE Transac-
tions on Computers, 65(12):3591–3605.
Kapoor, A. and Dhavale, S. (2016). Control flow graph
based multiclass malware detection using bi-normal
separation. Defence Science Journal, 66(2):138.
Detecting IoT Botnet Formation using Data Stream Clustering Algorithms
401