Improving IoT Botnet Investigation Using an Adaptive Network Layer

被引:46
作者
Ceron, Joao Marcelo [1 ]
Steding-Jessen, Klaus [2 ]
Hoepers, Cristine [2 ]
Granville, Lisandro Zambenedetti [3 ]
Margi, Cintia Borges [4 ]
机构
[1] Univ Twente, DACS, NL-7522 NB Enschede, Netherlands
[2] CERT Br, Brazilian Natl Comp Emergency Response Team, BR-05801000 Sao Paulo, Brazil
[3] Univ Fed Rio Grande do Sul, UFRGS, BR-91501970 Porto Alegre, RS, Brazil
[4] Univ Sao Paulo, BR-05508010 Sao Paulo, Brazil
来源
SENSORS | 2019年 / 19卷 / 03期
关键词
malware; IoT; botnet; malware analysis; SDN;
D O I
10.3390/s19030727
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets' intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.
引用
收藏
页数:16
相关论文
共 26 条
[1]  
[Anonymous], 2016, HEIGHT DDOS THREAT P
[2]  
[Anonymous], P 9 CENTR E EUR SOFT
[3]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[4]  
Bellard F., Qemu - open source processor emulator
[5]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[6]  
Ceron J., 2016, P ISCC 2016 21 IEEE
[7]   MARS: From traffic containment to network reconfiguration in malware-analysis systems [J].
Ceron, Joao Marcelo ;
Margi, Cintia Borges ;
Granville, Lisandro Zambenedetti .
COMPUTER NETWORKS, 2017, 129 :261-272
[8]  
CERTbr, HONEYTARG DISTR HON
[9]  
Cozzi E., 2018, P IEEE S SEC PRIV SA
[10]  
Dulaunoy A., 2017, P NETW C TNC, V17, P1