Skip to main content
Top
Published in: International Journal of Information Security 5/2020

23-10-2019 | Regular Contribution

A novel graph-based approach for IoT botnet detection

Published in: International Journal of Information Security | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. These IoT devices can communicate with others over the Internet and fully integrate into people’s daily life. In recent years, IoT devices still suffer from basic security vulnerabilities making them vulnerable to a variety of threats and malware, especially IoT botnets. Unlike common malware on desktop personal computer and Android, heterogeneous processor architecture issue on IoT devices brings various challenges for researchers. Many studies take advantages of well-known dynamic or static analysis for detecting and classifying botnet on IoT devices. However, almost studies yet cannot address the multi-architecture issue and consume vast computing resources for analyzing. In this paper, we propose a lightweight method for detecting IoT botnet, which based on extracting high-level features from function–call graphs, called PSI-Graph, for each executable file. This feature shows the effectiveness when dealing with the multi-architecture problem while avoiding the complexity of control flow graph analysis that is used by most of the existing methods. The experimental results show that the proposed method achieves an accuracy of 98.7%, with the dataset of 11,200 ELF files consisting of 7199 IoT botnet samples and 4001 benign samples. Additionally, a comparative study with other existing methods demonstrates that our approach delivers better outcome. Lastly, we make the source code of this work available to Github.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Burhan, M., Rehman, R.A., Khan, B., Kim, B.-S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)CrossRef Burhan, M., Rehman, R.A., Khan, B., Kim, B.-S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)CrossRef
2.
go back to reference Tankard, C.: Digital pathways, the security issues of the internet of things. Comput Fraud Secur 2015(9), 11–14 (2015)CrossRef Tankard, C.: Digital pathways, the security issues of the internet of things. Comput Fraud Secur 2015(9), 11–14 (2015)CrossRef
5.
6.
go back to reference De Donno, Michele, Dragon, Nicola, Giaretta, Alberto: DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Journal Security and Communication Networks. Wiley, London (2018) De Donno, Michele, Dragon, Nicola, Giaretta, Alberto: DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Journal Security and Communication Networks. Wiley, London (2018)
7.
go back to reference Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: a novel honenypot for revealing current IoT threats. J. Inf. Process. 24, 522–533 (2016) Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: a novel honenypot for revealing current IoT threats. J. Inf. Process. 24, 522–533 (2016)
8.
go back to reference Tran, N.-P. et al.: Towards malware detection in routers with C500-toolkit. In: 5th International Conference on Information and Communication Technology (ICoIC7). IEEE, pp. 1–5 (2017) Tran, N.-P. et al.: Towards malware detection in routers with C500-toolkit. In: 5th International Conference on Information and Communication Technology (ICoIC7). IEEE, pp. 1–5 (2017)
9.
go back to reference Hampton, N., Szewczyk, P.: A survey and method for analysing SOHO router firmware currency. In: 13th Australian Information Security Management Conference, pp. 11-27 (2015) Hampton, N., Szewczyk, P.: A survey and method for analysing SOHO router firmware currency. In: 13th Australian Information Security Management Conference, pp. 11-27 (2015)
10.
go back to reference Alhanahnah, M., Lin, Q., Yan, Q.: Efficient signature generation for classifying cross-architecture IoT malware. In: Conference on Communications and Network Security (CNS). IEEE, pp. 1–9 (2018) Alhanahnah, M., Lin, Q., Yan, Q.: Efficient signature generation for classifying cross-architecture IoT malware. In: Conference on Communications and Network Security (CNS). IEEE, pp. 1–9 (2018)
11.
go back to reference Isawa, R.: Evaluating disassembly-code based similarity between IoT malware samples. In: 2018 13th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, pp. 89–94 (2018) Isawa, R.: Evaluating disassembly-code based similarity between IoT malware samples. In: 2018 13th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, pp. 89–94 (2018)
12.
go back to reference Su, J., Vasconcellos D., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.:Lightweight classification of IoT malware based on image recognition. In: 2018 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, pp. 664–669 (2018) Su, J., Vasconcellos D., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.:Lightweight classification of IoT malware based on image recognition. In: 2018 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, pp. 664–669 (2018)
13.
go back to reference Chang, K.-C., Tso, R., Tsai, M.-C.: IoT sandbox: to analysis IoT malware Zollard. In: Proceedings of the Second International Conference on Internet of things and Cloud Computing. ACM, pp. 4–12 (2017) Chang, K.-C., Tso, R., Tsai, M.-C.: IoT sandbox: to analysis IoT malware Zollard. In: Proceedings of the Second International Conference on Internet of things and Cloud Computing. ACM, pp. 4–12 (2017)
14.
go back to reference McDermott, C.D., Majdani, F., Petrovski, A.V.: Botnet detection in the internet of things using deep learning approaches. In: International Joint Conference on Neural Networks (IJCNN). IEEE, pp. 1–8 (2018) McDermott, C.D., Majdani, F., Petrovski, A.V.: Botnet detection in the internet of things using deep learning approaches. In: International Joint Conference on Neural Networks (IJCNN). IEEE, pp. 1–8 (2018)
15.
go back to reference Nath, H.V., Mehtre, B.M.: Static malware analysis using machine learning methods. In: Security in Computer Networks and Distributed Systems (SNDS). Springer, Berlin, pp. 440–450 (2014) Nath, H.V., Mehtre, B.M.: Static malware analysis using machine learning methods. In: Security in Computer Networks and Distributed Systems (SNDS). Springer, Berlin, pp. 440–450 (2014)
16.
go back to reference Kang, B., Yang, J., So, J., Kim, C.Y.: Detecting trigger-based behaviors in botnet malware. In: Proceedings of the 2015 Conference on research in Adaptive and Convergent Systems. ACM, pp. 274–279 (2015) Kang, B., Yang, J., So, J., Kim, C.Y.: Detecting trigger-based behaviors in botnet malware. In: Proceedings of the 2015 Conference on research in Adaptive and Convergent Systems. ACM, pp. 274–279 (2015)
17.
go back to reference Kapoor, A., Dhavale, S.: Control flow graph based multiclass malware detection using bi-normal separation. Def. Sci. J. 66(2), 138–145 (2016)CrossRef Kapoor, A., Dhavale, S.: Control flow graph based multiclass malware detection using bi-normal separation. Def. Sci. J. 66(2), 138–145 (2016)CrossRef
18.
go back to reference Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux Malware. In: Symposium on Security and Privacy. IEEE, pp. 870–884 (2018) Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding Linux Malware. In: Symposium on Security and Privacy. IEEE, pp. 870–884 (2018)
19.
go back to reference Azmoodeh, A., Dehghantanha, A., Choo, K.K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 4(1), 88–95 (2018)CrossRef Azmoodeh, A., Dehghantanha, A., Choo, K.K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 4(1), 88–95 (2018)CrossRef
20.
go back to reference Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J Netw. Comput. Appl. 36(2), 646–656 (2013)CrossRef Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J Netw. Comput. Appl. 36(2), 646–656 (2013)CrossRef
21.
go back to reference Nguyen, H.T., Ngo, Q.D., Le, V.H.: IoT botnet detection approach based on PSI-graph and DGCNN classifier. In: International Conference on Information Communication and Signal Processing (ICICSP). IEEE, pp. 118–122 (2018) Nguyen, H.T., Ngo, Q.D., Le, V.H.: IoT botnet detection approach based on PSI-graph and DGCNN classifier. In: International Conference on Information Communication and Signal Processing (ICICSP). IEEE, pp. 118–122 (2018)
22.
go back to reference HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Future Gener. Comput. Syst. 85, 88–88 (2018)CrossRef HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Future Gener. Comput. Syst. 85, 88–88 (2018)CrossRef
23.
go back to reference Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security. ACM, pp. 4–11 (2011) Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security. ACM, pp. 4–11 (2011)
24.
go back to reference Jung, B., Kim, T., Im, E.G.: Malware classification using byte sequence information. In: Proceedings of the Conference on Research in Adaptive and Convergent Systems. ACM, pp. 143–148 (2018) Jung, B., Kim, T., Im, E.G.: Malware classification using byte sequence information. In: Proceedings of the Conference on Research in Adaptive and Convergent Systems. ACM, pp. 143–148 (2018)
25.
go back to reference Hachem, N., et al., Botnets: lifecycle and taxonomy. In: 2011 Conference on Network and Information Systems Security. IEEE, pp. 1–8 (2011) Hachem, N., et al., Botnets: lifecycle and taxonomy. In: 2011 Conference on Network and Information Systems Security. IEEE, pp. 1–8 (2011)
26.
go back to reference Silva, S.S.C., et al.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef Silva, S.S.C., et al.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef
27.
go back to reference Sudhakar, K., Kumar, S.: Botnet detection techniques and research challenges. In: International Conference on Advances in Energy-Efficient Computing and Communication (2019) Sudhakar, K., Kumar, S.: Botnet detection techniques and research challenges. In: International Conference on Advances in Energy-Efficient Computing and Communication (2019)
28.
go back to reference Khoshhalpour, E., Shahriari, H.R.: BotRevealer: behavioral detection of botnets based on botnetlife-cycle. ISC Int. J. Inf. Secur. 10(1), 55–61 (2018) Khoshhalpour, E., Shahriari, H.R.: BotRevealer: behavioral detection of botnets based on botnetlife-cycle. ISC Int. J. Inf. Secur. 10(1), 55–61 (2018)
29.
go back to reference Prokofiev, A.O. et al.: A method to detect internet of things botnets. In: Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, pp. 105–108 (2018) Prokofiev, A.O. et al.: A method to detect internet of things botnets. In: Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, pp. 105–108 (2018)
31.
go back to reference Xu, M., et al.: A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1), 35–47 (2013)MathSciNetCrossRef Xu, M., et al.: A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1), 35–47 (2013)MathSciNetCrossRef
34.
go back to reference Eagle, C.: The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler. William Pollock, Clifton (2011) Eagle, C.: The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler. William Pollock, Clifton (2011)
35.
go back to reference Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: International Conference on Malicious and Unwanted Software. IEEE, pp. 113–120 (2010) Shang, S., Zheng, N., Xu, J., Xu, M., Zhang, H.: Detecting malware variants via function-call graph similarity. In: International Conference on Malicious and Unwanted Software. IEEE, pp. 113–120 (2010)
36.
go back to reference Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS-the internet of distributed denial of sevice attacks. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS), pp. 47–58 (2017) Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS-the internet of distributed denial of sevice attacks. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS), pp. 47–58 (2017)
37.
go back to reference Le, Q., Mikolov, T.: Distributed Representations of Sentences and Documents. In: Proceedings of the 31st International Conference on Machine Learning, pp. 1188–1196 (2014) Le, Q., Mikolov, T.: Distributed Representations of Sentences and Documents. In: Proceedings of the 31st International Conference on Machine Learning, pp. 1188–1196 (2014)
39.
go back to reference Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, pp. 1746–1751 (2014) Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics, pp. 1746–1751 (2014)
Metadata
Title
A novel graph-based approach for IoT botnet detection
Publication date
23-10-2019
Published in
International Journal of Information Security / Issue 5/2020
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-019-00475-6

Other articles of this Issue 5/2020

International Journal of Information Security 5/2020 Go to the issue

Premium Partner