Affiliation:
1. Department of Information Technology, Posts and Telecommunications Institute of Technology, Hanoi, Vietnam
2. Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam Graduate University of Science and Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam
Abstract
Nowadays, the number and types of IoT devices are increasing rapidly, which leads to an expansion in the attack surface of this kind of device. Besides, the number of Botnet malware on IoT devices also grows with a lot of new variants. This context leads to an urgent demand for an effective solution in detecting new variants of IoT Botnet malware. There have been many studies focusing on IoT Botnet malware detection using static and dynamic analysis. In particular, the combination of the dynamic method with machine learning has shown outstanding advantages to detect IoT Botnet variants. However, the preprocessing of behavioral data originated from malware is still complicated, and the number of input vector dimensions of the machine learning model is still huge. In addition, these models also consume a lot of resources and have limited detection capabilities. Besides, dynamic analysis studies based on system calls mostly use call frequency characteristics and have not effectively exploited IoT Botnet malware’s life cycle characteristics. In this paper, we propose the Directed System Call Graph (DSCG) feature to sequentially structure the system calls. This DSCG graph will be vectorized and used as an input for building a malware analysis model based on popular machine learning classifiers such as KNN, SVM, Decision Tree, etc. Experiments on the datasets demonstrate that the features extracted from this graph have low complexity but still ensure high accuracy in detecting IoT Botnets, especially with newly emerged IoT Botnet families. The proposed model was evaluated with ACC = 98.01 % , TPR = 97.93 % , FPR = 1.5 % , AUC = 0.9961 on a dataset of 5023 IoT Botnets and 3888 benign samples.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference9 articles.
1. Tsunami: A parasitic, indestructible botnet on KAD;Memon;Peer-to-Peer Networking and Applications,2014
2. DDoS in the IoT: Mirai and other botnets;Kolias;Computer,2017
3. Internet of Things (IoT) of smart home: privacy and security;Shouran;International Journal of Computer Applications,2019
4. Integrating static and dynamic analysis for detecting vulnerabilities;Aggarwal;30th Annual International Computer Software and Applications Conference (COMPSAC’ 06), IEEE,2006
5. Alhaidari S. and Zohdy M. , Feature Pruning Method for hidden markov model-based anomaly detection: A Comparison of performance, Jordanian Journal of Computers and Information Technology (JJCIT) 4(03) (2018).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献