Understanding and Detecting Remote Infection on Linux-based IoT Devices

被引:3
|
作者
Li, Hongda [1 ]
Huang, Qiqing [2 ]
Ding, Fei [1 ]
Hu, Hongxin [2 ]
Cheng, Long [1 ]
Gu, Guofei [3 ]
Zhao, Ziming [2 ]
机构
[1] Clemson Univ, Clemson, SC 29634 USA
[2] Univ Buffalo, Buffalo, NY USA
[3] Texas A&M Univ, College Stn, TX USA
基金
美国国家科学基金会;
关键词
Linux-based IoT; Remote Infection; Malware Detection; Shell Command;
D O I
10.1145/3488932.3517423
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rocketed population, poor security, and 24/7 online properties make Linux-based Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget constraints and an enormous number of vulnerabilities on such devices, protecting them against attacks is very challenging. Therefore, understanding and detecting IoT malware remote infection, which is before the compromised IoT devices are monetized by adversaries, is crucial to mitigate damages and financial loss caused by IoT malware. In this paper, we conduct an empirical study on a large-scale dataset covering 403,464 samples collected from VirusShare and a large group of IoT honeypots to gain a deep insight into the characteristics of IoT malware remote infection. We share detailed statistics of shell commands found in our dataset, highlight malicious behaviors performed through those commands, investigate current states of fingerprinting methods of those commands, and offer a taxonomy of shell commands by introducing the notion of infection capability. To demonstrate the usefulness of the knowledge gained from our study, we develop an approach to detect on-going remote infection activities based on infection capabilities. Our evaluation shows that our detection approach can achieve a 99.22% detection rate for remote infections in the wild and introduce small performance overhead.
引用
收藏
页码:873 / 887
页数:15
相关论文
共 50 条
  • [11] A linux-based integrated structural health monitoring system for bridges in remote regions
    Yan Y.
    Wu Z.
    Wu X.
    Zhou X.
    Weng C.
    Instrumentation Mesure Metrologie, 2019, 18 (06): : 527 - 534
  • [12] A Linux-based IDPS using Snort
    Ahmed, Ghilman
    Khan, Muhammad Naeem Ahmed
    Bashir, Muhammad Shamraiz
    Computer Fraud and Security, 2015, 2015 (08): : 13 - 18
  • [13] Reassembling Linux-based Hybrid RAID
    Choi, Jong-Hyun
    Park, Jungheum
    Lee, Sangjin
    JOURNAL OF FORENSIC SCIENCES, 2020, 65 (03) : 966 - 973
  • [14] Traffic control in Linux-based routers
    Zhang, Huan-Qiang
    Wu, Zhi-Mei
    Ruan Jian Xue Bao/Journal of Software, 2005, 16 (03): : 462 - 471
  • [15] Clustering software for Linux-based HPC
    Hasegawa, Atsushi
    Matsuoka, Hiroshi
    Nakanishi, Kouichi
    NEC Research and Development, 2003, 44 (01): : 60 - 63
  • [16] Implementing WIPI for linux-based smartphone
    Lee, J
    Kim, SA
    Lee, S
    Kim, W
    Lee, H
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 692 - 696
  • [17] Clustering software for Linux-based HPC
    Hasegawa, A
    Matsuoka, H
    Nakanishi, K
    NEC RESEARCH & DEVELOPMENT, 2003, 44 (01): : 60 - 63
  • [18] An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
    Zheng, Yaowen
    Song, Zhanwei
    Sun, Yuyan
    Cheng, Kai
    Zhu, Hongsong
    Sun, Limin
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [19] Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis
    Cheng, Kai
    Zheng, Yaowen
    Liu, Tao
    Guan, Le
    Liu, Peng
    Li, Hong
    Zhu, Hongsong
    Ye, Kejiang
    Sun, Limin
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 360 - 372
  • [20] Performance-Baseline Estimation of File System Operations for Linux-Based Edge Devices
    Bhat, Wasim Ahmad
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 7537 - 7544