Examination of Traditional Botnet Detection on IoT-Based Bots

被引:2
|
作者
Woodiss-Field, Ashley [1 ,2 ]
Johnstone, Michael N. [1 ,2 ]
Haskell-Dowland, Paul [1 ,2 ]
机构
[1] Edith Cowan Univ, Sch Sci, Joondalup, WA 6027, Australia
[2] Edith Cowan Univ, Secur Res Inst, Joondalup, WA 6027, Australia
关键词
botnet; Internet of Things; Mirai; detection;
D O I
10.3390/s24031027
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A botnet is a collection of Internet-connected computers that have been suborned and are controlled externally for malicious purposes. Concomitant with the growth of the Internet of Things (IoT), botnets have been expanding to use IoT devices as their attack vectors. IoT devices utilise specific protocols and network topologies distinct from conventional computers that may render detection techniques ineffective on compromised IoT devices. This paper describes experiments involving the acquisition of several traditional botnet detection techniques, BotMiner, BotProbe, and BotHunter, to evaluate their capabilities when applied to IoT-based botnets. Multiple simulation environments, using internally developed network traffic generation software, were created to test these techniques on traditional and IoT-based networks, with multiple scenarios differentiated by the total number of hosts, the total number of infected hosts, the botnet command and control (CnC) type, and the presence of aberrant activity. Externally acquired datasets were also used to further test and validate the capabilities of each botnet detection technique. The results indicated, contrary to expectations, that BotMiner and BotProbe were able to detect IoT-based botnets-though they exhibited certain limitations specific to their operation. The results show that traditional botnet detection techniques are capable of detecting IoT-based botnets and that the different techniques may offer capabilities that complement one another.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Profiling IoT-based Botnet Traffic using DNS
    Dwyer, Owen P. .
    Marnerides, Angelos K.
    Giotsas, Vasileios
    Mursch, Troy
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [2] Systematic Literature Review on IoT-Based Botnet Attack
    Ali, Ihsan
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    Almogren, Ahmad
    Raza, Muhammad Ahsan
    Shah, Syed Attique
    Khan, Anwar
    Gani, Abdullah
    [J]. IEEE ACCESS, 2020, 8 : 212220 - 212232
  • [3] Towards a Distributed Defence Mechanism Against IoT-based Bots
    Rivera, Carlos A. A.
    Shaghaghi, Arash
    Kanhere, Salil S.
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 449 - 452
  • [4] IoT-based botnet attacks systematic mapping study of literature
    Hamid, Habiba
    Noor, Rafidah Md
    Omar, Syaril Nizam
    Ahmedy, Ismail
    Anjum, Shaik Shabana
    Shah, Syed Adeel Ali
    Kaur, Sheena
    Othman, Fazidah
    Tamil, Emran Mohd
    [J]. SCIENTOMETRICS, 2021, 126 (04) : 2759 - 2800
  • [5] IoT-based botnet attacks systematic mapping study of literature
    Habiba Hamid
    Rafidah Md Noor
    Syaril Nizam Omar
    Ismail Ahmedy
    Shaik Shabana Anjum
    Syed Adeel Ali Shah
    Sheena Kaur
    Fazidah Othman
    Emran Mohd Tamil
    [J]. Scientometrics, 2021, 126 : 2759 - 2800
  • [6] Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Zarpelao, B. B.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [7] Detection of IoT Botnet Based on Deep Learning
    Liu, Junyi
    Liu, Shiyue
    Zhang, Sihua
    [J]. PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 8381 - 8385
  • [8] Correction to: The Impact of Memory‑Efficient Bots on IoT‑WSN Botnet Propagation
    Mohammed Ibrahim
    Mohd Taufik Abdullah
    Azizol Abdullah
    Thinagaran Perumal
    [J]. Wireless Personal Communications, 2021, 119 (3) : 2107 - 2107
  • [9] IOT-based Detection for Tropical Flower
    Zhang, Jian
    Guo, Zhi-Liang
    Chen, Shan-Shah
    Shao, Bing-Qian
    Wang, Yuan-Tang
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI 2016), 2016, : 219 - 222
  • [10] IoT Botnet Detection Based on the Behaviors of DNS Queries
    Fan, Chun-I
    Shie, Cheng-Han
    Hsu, Che-Ming
    Ban, Tao
    Morikawa, Tomohiro
    Takahashi, Takeshi
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,