IoT network Malicious Behaviour Profiling Based on Explainable AI Using LSTM and SHAP
dc.contributor.advisor | Habibi Lashkari, Arash | |
dc.contributor.author | Niktabe, Sepideh | |
dc.date.accessioned | 2024-11-07T11:11:25Z | |
dc.date.available | 2024-11-07T11:11:25Z | |
dc.date.copyright | 2024-08-01 | |
dc.date.issued | 2024-11-07 | |
dc.date.updated | 2024-11-07T11:11:25Z | |
dc.degree.discipline | Computer Science | |
dc.degree.level | Master's | |
dc.degree.name | MSc - Master of Science | |
dc.description.abstract | The proliferation of IoT devices has enhanced connectivity but exposed networks to new cyber threats, particularly from botnets. Detecting and identifying malicious data is critical for early threat detection, understanding botnet attack patterns, and deploying countermeasures. This research proposes an IoT Bot detection and identification profiling model using XAI. The proposed model introduces a novel feature selection techqnique with the XGBoost algorithm and a correlation-based feature selection technique to enhance efficiency. An optimized LSTM neural network enables accurate bot detection and identification, with hyperparameters selected using the Bayesian Optimization algorithm. SHAP analysis provides insightful individual and collective bot characteristic profiles. The model’s performance was evaluated using the augmented BCCC-Aposemat-Bot-IoT-24 dataset, built upon the Aposemat-Bot-IoT-23 dataset, and compared against established models assessed primarily on the same dataset in previous research. The results showed that the proposed model performed comparably to these models, with distinct advantages, including handling sequential and time-series data, managing imbalanced datasets, and providing explainable insights into botnet behavior. The model’s design also emphasizes computational efficiency, making it potentially suitable for deployment in resource-constrained environments. | |
dc.identifier.uri | https://hdl.handle.net/10315/42467 | |
dc.language | en | |
dc.rights | Author owns copyright, except where explicitly noted. Please contact the author directly with licensing requests. | |
dc.subject | Computer science | |
dc.subject.keywords | Internet of Things (IoT) | |
dc.subject.keywords | Transmission control protocol (TCP) | |
dc.subject.keywords | Malicious bot | |
dc.subject.keywords | Malicious profiling | |
dc.subject.keywords | Attack detection | |
dc.subject.keywords | Network security | |
dc.title | IoT network Malicious Behaviour Profiling Based on Explainable AI Using LSTM and SHAP | |
dc.type | Electronic Thesis or Dissertation |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- York_University___Master_Thesis___Sepideh_Niktabe.pdf
- Size:
- 3.32 MB
- Format:
- Adobe Portable Document Format