HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing

被引:0
作者
Chen, Ziqian
Xia, Wei [1 ]
Li, Zhen
Xiong, Gang
Gou, Gaopeng
Zhang, Heng
Li, Haikuo
Xiao, Junchao
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Internet of things; Malicious traffic detection; Host-level framework; Computational efficiency; Cost sensitive; BOTNET DETECTION; NETWORK;
D O I
10.1016/j.cose.2025.104360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of Internet of Things (IoT) devices, IoT security issues are becoming increasingly prominent. A significant number of devices remain highly vulnerable to malware attacks due to inadequate security management. Asa solution, machine learning-based network traffic behavior analysis has proven to be effective and is widely deployed across various scenarios. However, the efficiency of network feature extraction and online detection is significantly constrained by the insufficient computing resources available on the IoT devices. To address the challenge, we propose HoleMal, a novel host-level framework to detect malicious network behavior in resource-constrained environment. HoleMal provides a comprehensive suite of host-level traffic monitoring, processing, and detection solutions, aiming to achieve optimal network protection with minimal resource cost. During the detection process, HoleMal constructs host-level traffic features from the device's perspective. It describes a device's behavior in 3 dimensions, including connection behavior, network activity and accessed service, corresponding to a total of 36 host-level features. As these features are unrelated to payloads, they are not affected by traffic encryption. Furthermore, HoleMal provides a cost-sensitive feature selector which is able to quantify the feature computational cost and involve the cost into the feature selection process. It identifies the host-level feature subset with superior detection capability and minimal computational cost, thereby providing theoretical basis for detection model construction, further enhancing the efficiency advantages of HoleMal. We evaluate HolaMal by multiple datasets on Raspberry Pi. The experimental results demonstrate that HoleMal exhibits robust detection performance across all datasets, and it achieves significant efficiency improvements compared to fine-grained approaches.
引用
收藏
页数:12
相关论文
共 37 条
  • [1] Abdalzaher M.S., Fouda M.M., Elsayed H.A., Salim M.M., Toward secured IoT-based smart systems using machine learning, IEEE Access, 11, pp. 20827-20841, (2023)
  • [2] Alani M.M., BotStop: Packet-based efficient and explainable IoT botnet detection using machine learning, Comput. Commun., 193, pp. 53-62, (2022)
  • [3] Alazab M., A discrete time-varying greywolf IoT botnet detection system, Comput. Commun., 192, pp. 405-416, (2022)
  • [4] Ali S., Abusabha O., Ali F., Imran M., Abuhmed T., Effective multitask deep learning for IoT malware detection and identification using behavioral traffic analysis, IEEE Trans. Netw. Serv. Manag., 20, 2, pp. 1199-1209, (2023)
  • [5] Almazarqi H.A., Marnerides A.K., Mursch T., Woodyard M., Pezaros D., Profiling IoT botnet activity in the wild, 2021 IEEE Global Communications Conference, GLOBECOM, pp. 1-6, (2021)
  • [6] Alzahrani M.Y., Bamhdi A.M., Hybrid deep-learning model to detect botnet attacks over internet of things environments, Soft Comput., 26, pp. 7721-7735, (2022)
  • [7] Anitha T., Aanjankumar S., Shanmugam P., Nayyar A., A novel methodology for malicious traffic detection in smart devices using BI-LSTM–CNN-dependent deep learning methodology, Neural Comput. Appl., 35, pp. 1-20, (2023)
  • [8] Bojarajulu B., Tanwar S., Singh T.P., Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model, Comput. Secur., 126, (2023)
  • [9] Christian C.
  • [10] Garcia S., Parmisano A., Erquiaga M.J., IoT-23: A Labeled Dataset with Malicious and Benign Iot Network Traffic (Version 1.0.0) [Data Set], (2020)