IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices

被引:49
作者
Bezerra, Vitor Hugo [1 ]
Turrisi da Costa, Victor Guilherme [1 ]
Barbon Junior, Sylvio [1 ]
Miani, Rodrigo Sanches [2 ]
Zarpelao, Bruno Bogaz [1 ]
机构
[1] State Univ Londrina UEL, Comp Sci Dept, BR-86057970 Londrina, PR, Brazil
[2] Fed Univ Uberlandia UFU, Sch Comp Sci, BR-38400902 Uberlandia, MG, Brazil
关键词
Internet of Things; botnet; anomaly detection; host-based; INTRUSION DETECTION;
D O I
10.3390/s19143188
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device's behaviour, the approach extracts features from the device's CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device's energy consumption, and CPU and memory utilisation.
引用
收藏
页数:26
相关论文
共 37 条
[1]  
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[2]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[3]  
Amaral JP, 2014, IEEE ICC, P1796, DOI 10.1109/ICC.2014.6883583
[4]  
An N, 2017, PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P47, DOI 10.1109/MALWARE.2017.8323956
[5]  
Angrishi K., 2017, IOT BOTNETS
[6]  
[Anonymous], ARXIV180503409
[7]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]  
Ashton Kevin., 2009, That Internet of Things Thing
[9]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[10]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79