An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things

被引:43
作者
Nguyen, Tu N. [1 ]
Quoc-Dung Ngo [2 ]
Huy-Trung Nguyen [3 ]
Giang Long Nguyen [4 ]
机构
[1] Kennesaw State Univ, Dept Comp Sci, Marietta, GA 30060 USA
[2] Posts & Telecommun Inst Technol, Fac Informat Technol, Hanoi 100000, Vietnam
[3] Peoples Secur Acad, Hanoi 100000, Vietnam
[4] Vietnam Acad Sci & Technol, Inst Informat Technol, Hanoi 100000, Vietnam
关键词
Botnet; Malware; Feature extraction; Industrial Internet of Things; Static analysis; Informatics; Heuristic algorithms; Hybrid approach; industrial Internet of Things (IIoT); IoT botnet detection; machine-learning; MALWARE DETECTION;
D O I
10.1109/TII.2022.3152814
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, attackers have been shifting aggressively to the IoT devices in industrial Internet of things (IIoT). Particularly, IoT botnet has been emerging as the most urgent issue in IoT security. The main approaches for IoT botnet detection are static, dynamic, and hybrid analysis. Static analysis is the process of parsing files without executing them, while dynamic analysis, in contrast, executes them in a controlled and monitored environment (i.e., sandbox, simulator, and emulator) to record system's changes for further investigation. In this article, we present a novel and advanced method for IoT botnet detection using dynamic analysis to improve graph-based features, which are generated based on static analysis. Specifically, dynamic analysis is used to collect printable string information that appears during the execution of the samples. Then, we use the printable string information to traverse the graph, which is obtained based on the static analysis, effectively, and ultimately acquiring graph-based features that can distinguish benign and malicious samples. In order to estimate the efficacy and superiority of the proposed hybrid approach, we conduct the experiment on a dataset of 8330 executable samples, including 5531 IoT botnet samples and 2799 IoT benign samples. Our approach achieves an accuracy of 98.1% and 91.99% for detecting and classifying IoT botnet, respectively. These results show that our approach has outperformed other existing contemporary counterpart methods in the aspects of accuracy and complexity. In addition, our experiments also demonstrate that hybrid graph-based features for IoT botnet family classification can further improve static or dynamic features' performance individually.
引用
收藏
页码:8298 / 8306
页数:9
相关论文
共 28 条
[1]  
[Anonymous], NEW TRENDS WORLD IOT
[2]  
[Anonymous], VIRUSSHARE SHARING I
[3]  
[Anonymous], 2015, PROC 9 USENIX WORKSH
[4]  
[Anonymous], Internet of Things number of connected devices worldwide 2015- 2025
[5]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[6]   Detecting crypto-ransomware in IoT networks based on energy consumption footprint [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Conti, Mauro ;
Choo, Kim-Kwang Raymond .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :1141-1152
[7]   IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey [J].
Burhan, Muhammad ;
Rehman, Rana Asif ;
Khan, Bilal ;
Kim, Byung-Seo .
SENSORS, 2018, 18 (09)
[8]  
Costin Andrei., 2018, Iot malware: Comprehensive survey, analysis framework and case studies
[9]   An opcode-based technique for polymorphic Internet of Things malware detection [J].
Darabian, Hamid ;
Dehghantanha, Ali ;
Hashemi, Sattar ;
Homayoun, Sajad ;
Choo, Kim-Kwang Raymond .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06)
[10]   The rise of machine learning for detection and classification of malware: Research developments, trends and challenges [J].
Gibert, Daniel ;
Mateu, Carles ;
Planes, Jordi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 153