On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

被引:42
作者
Pour, Morteza Safaei [1 ]
Mangino, Antonio [1 ]
Friday, Kurt [1 ]
Rathbun, Matthias [2 ]
Bou-Harb, Elias [1 ]
Iqbal, Farkhund [3 ]
Samtani, Sagar [4 ]
Crichigno, Jorge [5 ]
Ghani, Nasir [6 ]
机构
[1] Univ Texas San Antonio, Cyber Ctr Secur & Analyt, San Antonio, TX 78249 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
[3] Zayed Univ, Coll Technol Innovat, Abu Dhabi, U Arab Emirates
[4] Univ S Florida, Dept Informat Syst & Decis Sci, Tampa, FL 33620 USA
[5] Univ South Carolina, Integrated Informat Technol, Columbia, SC 29208 USA
[6] Univ S Florida, Dept Elect Engn & Cyber Florida, Tampa, FL 33620 USA
基金
美国国家科学基金会;
关键词
Data science; Cyber forensics; Internet-of-things; IoT Security; Internet measurements;
D O I
10.1016/j.cose.2019.101707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructures. The highly heterogeneous nature of IoT devices and their widespread deployments has led to the rise of several key security and measurement-based challenges, significantly crippling the process of collecting, analyzing and correlating IoT-centric data. To this end, this paper explores macroscopic, passive empirical data to shed light on this evolving threat phenomena. The proposed work aims to classify and infer Internet-scale compromised IoT devices by solely observing one-way network traffic, while also uncovering, reporting and thoroughly analyzing "in the wild" IoT botnets. To prepare a relevant dataset, a novel probabilistic model is developed to cleanse unrelated traffic by removing noise samples (i.e., misconfigured network traffic). Subsequently, several shallow and deep learning models are evaluated in an effort to train an effective multi-window convolutional neural network. By leveraging active and passing measurements when generating the training dataset, the neural network aims to accurately identify compromised IoT devices. Consequently, to infer orchestrated and unsolicited activities that have been generated by well-coordinated IoT botnets, hierarchical agglomerative clustering is employed by scrutinizing a set of innovative and efficient network feature sets. Analyzing 3.6 TB of recently captured darknet traffic revealed a momentous 440,000 compromised IoT devices and generated evidence-based artifacts related to 350 IoT botnets. Moreover, by conducting thorough analysis of such inferred campaigns, we reveal their scanning behaviors, packet inter-arrival times, employed rates and geo-distributions. Although several campaigns exhibit significant differences in these aspects, some are more distinguishable; by being limited to specific geo-locations or by executing scans on random ports besides their core targets. While many of the inferred botnets belong to previously documented campaigns such as Hide and Seek, Haj ime and Fbot, newly discovered events portray the evolving nature of such IoT threat phenomena by demonstrating growing cryptojacking capabilities or by targeting industrial control services. To motivate empirical (and operational) IoT cyber security initiatives as well as aid in reproducibility of the obtained results, we make the source codes of all the developed methods and techniques available to the research community at large. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 71 条
[1]   Web-based Attacks to Discover and Control Local IoT Devices [J].
Acar, Gunes ;
Huang, Danny Yuxing ;
Li, Frank ;
Narayanan, Arvind ;
Feamster, Nick .
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, :29-35
[2]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[3]  
[Anonymous], PROFILLOT MACHINE LE
[4]  
[Anonymous], LATEST ETHOBOT 26 IN
[5]  
[Anonymous], FBOT SATORI RELATED
[6]  
[Anonymous], TECHNICAL REPORT
[7]  
[Anonymous], INT J INFORM SECURIT
[8]  
[Anonymous], 2015, Ann Data Sci, DOI DOI 10.1007/S40745-015-0040-1
[9]  
[Anonymous], DETECTING LOT DEVICE
[10]  
[Anonymous], ADB MINER MORE INFOR