SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation

被引:6
作者
Alasmary, Hisham [1 ,2 ]
Anwar, Afsah [2 ]
Abusnaina, Ahmed [2 ]
Alabduljabbar, Abdulrahman [2 ]
Abuhamad, Mohammed [2 ,3 ]
Wang, An [4 ]
Nyang, Daehun [5 ]
Awad, Amro [6 ]
Mohaisen, David [2 ]
机构
[1] King Khalid Univ, Dept Comp Sci, Abha 61421, Saudi Arabia
[2] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
[3] Loyola Univ, Dept Comp Sci, IL 60660 USA, Chicago, IL USA
[4] Case Western Reserve Univ, Dept Comp & Data Sci, Cleveland, OH 44106 USA
[5] Ewha Womans Univ, Div Software & Engn, Cyber Secur Major, Seoul 03760, South Korea
[6] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT) security; Linux shell commands; machine learning; malware detection; MALWARE;
D O I
10.1109/JIOT.2021.3086398
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform various functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to Internet of Things (IoT) devices, malware authors can abuse the Linux shell of those devices to propagate infections and launch large-scale attacks, e.g., Distributed Denial of Service. In this work, we provide a first look at the tasks managed by shell commands in Linux-based IoT malware toward detection. We analyze malicious shell commands found in IoT malware and build a neural network-based model, ShellCore, to detect malicious shell commands. Namely, we collected a large data set of shell commands, including malicious commands extracted from 2891 IoT malware samples and benign commands collected from real-world network traffic analysis and volunteered data from Linux users. Using conventional machine and deep learning-based approaches trained with a term- and character-level features, ShellCore is shown to achieve an accuracy of more than 99% in detecting malicious shell commands and files (i.e., binaries).
引用
收藏
页码:2485 / 2496
页数:12
相关论文
共 54 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]  
Alasmary Hisham, 2018, Computational Data and Social Networks. 7th International Conference, CSoNet 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11280), P259, DOI 10.1007/978-3-030-04648-4_22
[3]  
Alasmary H, 2020, 40 IEEE INT C DISTRI, P1296
[4]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[5]   SoK: Security Evaluation of Home-Based IoT Deployments [J].
Alrawi, Omar ;
Lever, Chaz ;
Antonakakis, Manos ;
Monrose, Fabian .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1362-1380
[6]  
[Anonymous], Upx: The ultimate packer for executables
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]  
Anwar Afsah, 2020, Information and Communications Security. 22nd International Conference, ICICS 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12282), P443, DOI 10.1007/978-3-030-61078-4_25
[9]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[10]  
Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381