Using honeypots to model botnet attacks on the internet of medical things

被引:13
|
作者
Wang, Huanran [1 ]
He, Hui [1 ]
Zhang, Weizhe [1 ,2 ]
Liu, Wenmao [3 ]
Liu, Peng [4 ]
Javadpour, Amir [5 ]
机构
[1] Harbin Inst Technol, Sch Cyberspace Sci, Harbin, Peoples R China
[2] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[3] NSFOCUS inc, Beijing, Peoples R China
[4] Penn State Univ, State Coll, PA USA
[5] Harbin Inst Technol, Dept Comp Sci & Technol, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; Botnet; Attack pattern; Control period; Internet of medical things;
D O I
10.1016/j.compeleceng.2022.108212
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Corona Virus Disease 2019 (COVID-19) has led to an increase in attacks targeting widespread smart devices. A vulnerable device can join multiple botnets simultaneously or sequentially. When different attack patterns are mixed with attack records, the security analyst produces an inaccurate report. There are numerous studies on botnet detection, but there is no publicly available solution to classify attack patterns based on the control periods. To fill this gap, we propose a novel data-driven method based on an intuitive hypothesis: bots tend to show time-related attack patterns within the same botnet control period. We deploy 462 honeypots in 22 countries to capture real-world attack activities and propose an algorithm to identify control periods. Experiments have demonstrated our method's efficacy. Besides, we present eight interesting findings that will help the security community better understand and fight botnet attacks now and in the future.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] IoTEnsemble: Detection of Botnet Attacks on Internet of Things
    Li, Ruoyu
    Li, Qing
    Huang, Yucheng
    Zhang, Wenbin
    Zhu, Peican
    Jiang, Yong
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 569 - 588
  • [2] Deep Residual CNN for Preventing Botnet Attacks on The Internet of Things
    Rahmantyo, D. Tsany
    Erfianto, Bayu
    Satrya, G. Bayu
    2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 462 - 466
  • [3] Hybrid deep-learning model to detect botnet attacks over internet of things environments
    Mohammed Y. Alzahrani
    Alwi M. Bamhdi
    Soft Computing, 2022, 26 : 7721 - 7735
  • [4] Hybrid deep-learning model to detect botnet attacks over internet of things environments
    Alzahrani, Mohammed Y.
    Bamhdi, Alwi M.
    SOFT COMPUTING, 2022, 26 (16) : 7721 - 7735
  • [5] Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach
    Ahanger, Tariq Ahamed
    Aldaej, Abdulaziz
    Atiquzzaman, Mohammed
    Ullah, Imdad
    Uddin, Mohammed Yousuf
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3199 - 3217
  • [6] Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach
    Hasan, Tooba
    Malik, Jahanzaib
    Bibi, Iram
    Khan, Wali Ullah
    Al-Wesabi, Fahd N.
    Dev, Kapal
    Huang, Gaojian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2952 - 2963
  • [7] Defeating Internet attacks using risk awareness and active honeypots
    Teo, L
    Sun, YA
    Ahn, GJ
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 155 - 167
  • [8] Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things
    Khan, Zeeshan Ali
    Abbasi, Ubaid
    ELECTRONICS, 2020, 9 (03)
  • [9] Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things
    Sheheryar, Mir Aman
    Sharma, Sparsh
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (03):
  • [10] Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021