From: A novel botnet attack detection for IoT networks based on communication graphs
Dataset | Malware | Render | IDM | ODM | IWM | OWM | CCM | BCM | EVM | Generate |
---|---|---|---|---|---|---|---|---|---|---|
01-01_IoTMaleware | Hide &Seek | 27.37 | 0.11 | 0.12 | 0.17 | 0.17 | 12304.63 | 1535.87 | 9.72 | 15.27 |
03-01_IoTMaleware | Mushtik | 3.76 | 0.02 | 0.02 | 0.02 | 0.02 | 39.97 | 220.47 | 2.41 | 3.13 |
09-01_IoTMaleware | linux-hiajime | 240.89 | 2.01 | 1.60 | 1.98 | 1.59 | 101656.02 | 12688.70 | 232.42 | 306.34 |
35-01_IoTMaleware | Mirai | 326.80 | 1.67 | 2.15 | 1.66 | 2.17 | 78904.09 | 9848.85 | 98.84 | 161.27 |
36-01_IoTMaleware | Okiru | 2,171.02 | 62.14 | 63.04 | 62.16 | 64.02 | 261550.12 | 32646.82 | 2436.50 | 1437.12 |
60-01_IoTMaleware | GagFyt | 77.26 | 0.02 | 0.02 | 0.02 | 0.02 | 4.05 | 3.18 | 2.01 | 0.58 |