Evidence Fusion for Malicious Bot Detection in IoT

被引:0
作者
Chatterjee, Moitrayee [1 ]
Namin, Akbar Siami [1 ]
Datta, Prerit [1 ]
机构
[1] Texas Tech Univ, Comp Sci Dept, Lubbock, TX 79409 USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2018年
基金
美国国家科学基金会;
关键词
Internet of Things (IoT); Botnet; Big data; Bots; Dempster-Shafer Theory; Apriori Algorithm; Cyber Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Billions of devices in the Internet of Things (IoT) are inter-connected over the internet and communicate with each other or end users. IoT devices communicate through messaging bots. These bots are important in IoT systems to automate and better manage the work flows. IoT devices are usually spread across many applications and are able to capture or generate substantial influx of big data. The integration of IoT with cloud computing to handle and manage big data, requires considerable security measures in order to prevent cyber attackers from adversarial use of such large amount of data. An attacker can simply utilize the messaging bots to perform malicious activities on a number of devices and thus bots pose serious cybersecurity hazards for IoT devices. Hence, it is important to detect the presence of malicious bots in the network. In this paper we propose an evidence theory-based approach for malicious bot detection. Evidence Theory, a.k.a. Dempster Shafer Theory (DST) is a probabilistic reasoning tool and has the unique ability to handle uncertainty, i.e. in the absence of evidence. It can be applied efficiently to identify a bot, especially when the bots have dynamic or polymorphic behavior. The key characteristic of DST is that the detection system may not need any prior information about the malicious signatures and profiles. In this work, we propose to analyze the network flow characteristics to extract key evidence for bot traces. We then quantify these pieces of evidence using apriori algorithm and apply DST to detect the presence of the bots.
引用
收藏
页码:4545 / 4548
页数:4
相关论文
共 10 条
  • [1] Agrawal R., P 20 INT C VERY LARG
  • [2] Alenazi A., 2017, LECT NOTES COMPUTER, V10618
  • [3] Detecting Web Spams Using Evidence Theory
    Chatterjee, Moitrayee
    Namin, Akbar Siami
    [J]. 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 695 - 700
  • [4] Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
  • [5] Survey on network-based botnet detection methods
    Garcia, Sebastian
    Zunino, Alejandro
    Campo, Marcelo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 878 - 903
  • [6] Gu G., 2007, P 16 USENIX SEC S US
  • [7] Gu G., 2008, BOTMINER CLUSTERING
  • [8] A Framework for Understanding Botnets
    Leonard, Justin
    Xu, Shouhuai
    Sandhu, Ravi
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 917 - 922
  • [9] Moonsamy V., 2014, FUTURE GENER COMPUT, V36
  • [10] Shafer G., 1992, Encycl. Artif. Intell., V1, P330