Attack Detection and Forensics Using Honeypot in IoT Environment

被引:30
作者
Shrivastava, Rajesh Kumar [1 ]
Bashir, Bazila [1 ]
Hota, Chittaranjan [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Hyderabad Campus, Hyderabad, India
来源
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019 | 2019年 / 11319卷
关键词
Honeypot; Machine learning; Honeypot forensics; Behavior analysis;
D O I
10.1007/978-3-030-05366-6_33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a collection of tiny devices deployed with sensors. IoT automates embedded devices and controls them over the Internet. Ubiquitous deployment of IoT introduces a vision for the next generation of the Internet where users, computing systems, and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economic benefits. Due to the increased usage of IoT devices, the IoT networks are vulnerable to various security attacks by remote login (like SSH and Telnet). This paper focuses on capturing the attacks on IoT devices using Cowrie honeypot. We employ various machine learning algorithms, namely, Naive Bayes, J48 decision tree, Random Forest and Support Vector Machine (SVM) to classify these attacks. This research classifies attacks into various categories such as malicious payload, SSH attack, XOR DDoS, Spying, Suspicious and clean. Feature selection is carried out using subset evaluation and best first search. Once features are selected, we use the proposed SVM model and evaluate its performance with baseline models like Random Forest, Naive Bayes, J48 decision tree. The trained model's fitness is evaluated on the basis of various metrics such as accuracy, sensitivity, precision, and F-score, where accuracy varies from 67.7% to 97.39%. This work exhibits the inclusion of machine learning module to classify attacks by analyzing the exhibit behavior. In the end, we discuss our observations of honeypot forensics over the commands executed by the attacker to execute malicious attack.
引用
收藏
页码:402 / 409
页数:8
相关论文
共 11 条
[1]   A Feature Selection and Classification Algorithm Based on Randomized Extraction of Model Populations [J].
Brankovic, Aida ;
Falsone, Alessandro ;
Prandini, Maria ;
Piroddi, Luigi .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (04) :1151-1162
[2]   Enabling an Anatomic View to Investigate Honeypot Systems: A Survey [J].
Fan, Wenjun ;
Du, Zhihui ;
Fernandez, David ;
Villagra, Victor A. .
IEEE SYSTEMS JOURNAL, 2018, 12 (04) :3906-3919
[3]  
Fraunholz Daniel, 2017, 2017 International Conference on Cyber-Security and Protection of Digital Services (Cyber Security), DOI 10.1109/CyberSecPODS.2017.8074855
[4]   Data Mining in Long-Term Honeypot Data [J].
Fraunholz, Daniel ;
Zimmermann, Marc ;
Hafner, Alexander ;
Schotten, Hans D. .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :649-656
[5]  
Kuman S, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1262, DOI 10.23919/MIPRO.2017.7973617
[6]   Using honeynets to protect large enterprise networks [J].
Levine, JG ;
Grizzard, JB ;
Owen, HL .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :73-75
[7]   Active versus Passive Malware Collection [J].
Lin, Ying-Dar ;
Lee, Chia-Yin ;
Wu, Yu-Sung ;
Ho, Pei-Hsiu ;
Wang, Fu-Yu ;
Tsai, Yi-Lang .
COMPUTER, 2014, 47 (04) :59-65
[8]  
Mushtakov RE, 2018, PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), P86, DOI 10.1109/EIConRus.2018.8317036
[9]   Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks [J].
Paradise A. ;
Shabtai A. ;
Puzis R. ;
Elyashar A. ;
Elovici Y. ;
Roshandel M. ;
Peylo C. .
IEEE Transactions on Computational Social Systems, 2017, 4 (03) :65-79
[10]  
Sadasivam G.K., 2016, 2016 6 INT C IT CONV, P1, DOI 10.1109/ICITCS.2016.7740316