Understanding and Detecting Remote Infection on Linux-based IoT Devices

被引:2
|
作者
Li, Hongda [1 ]
Huang, Qiqing [2 ]
Ding, Fei [1 ]
Hu, Hongxin [2 ]
Cheng, Long [1 ]
Gu, Guofei [3 ]
Zhao, Ziming [2 ]
机构
[1] Clemson Univ, Clemson, SC 29634 USA
[2] Univ Buffalo, Buffalo, NY USA
[3] Texas A&M Univ, College Stn, TX USA
基金
美国国家科学基金会;
关键词
Linux-based IoT; Remote Infection; Malware Detection; Shell Command;
D O I
10.1145/3488932.3517423
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rocketed population, poor security, and 24/7 online properties make Linux-based Internet of Things (IoT) devices ideal targets for attackers. However, due to the budget constraints and an enormous number of vulnerabilities on such devices, protecting them against attacks is very challenging. Therefore, understanding and detecting IoT malware remote infection, which is before the compromised IoT devices are monetized by adversaries, is crucial to mitigate damages and financial loss caused by IoT malware. In this paper, we conduct an empirical study on a large-scale dataset covering 403,464 samples collected from VirusShare and a large group of IoT honeypots to gain a deep insight into the characteristics of IoT malware remote infection. We share detailed statistics of shell commands found in our dataset, highlight malicious behaviors performed through those commands, investigate current states of fingerprinting methods of those commands, and offer a taxonomy of shell commands by introducing the notion of infection capability. To demonstrate the usefulness of the knowledge gained from our study, we develop an approach to detect on-going remote infection activities based on infection capabilities. Our evaluation shows that our detection approach can achieve a 99.22% detection rate for remote infections in the wild and introduce small performance overhead.
引用
收藏
页码:873 / 887
页数:15
相关论文
共 50 条
  • [21] Reducing Obsolescence of Linux-Based ATEs with Virtualization
    Weltzin, Casey
    Schlonsky, Sarah
    2010 IEEE AUTOTESTCON, 2010, : 290 - 292
  • [22] Reducing Obsolescence of Linux-Based ATEs with Virtualization
    Weltzin, Casey
    Schlonsky, Sarah
    IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2011, 14 (04) : 8 - 10
  • [23] Linux-based experimental boundary scan environment
    Kac, U
    Sedevcic, R
    Novak, F
    Biasizzo, A
    MICROPROCESSORS AND MICROSYSTEMS, 2002, 26 (05) : 199 - 206
  • [24] Design and Application of Linux-Based Embedded Systems
    Sun, Chunling
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 641 - 645
  • [25] A Linux-based tool for hardware bring up, Linux development, and manufacturing
    Venton, T
    Miller, M
    Kalla, R
    Blanchard, A
    IBM SYSTEMS JOURNAL, 2005, 44 (02) : 319 - 329
  • [26] Linux-based performance monitoring of computing systems
    Xu, Jian
    Zhang, Kun
    Liu, Feng-Yu
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (05): : 622 - 627
  • [27] Linux-based lineage file and its evolution
    Hao, Yujie
    He, Yanjun
    Li, Jianping
    Lu, Guoming
    Liu, Hui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 907 - 910
  • [28] LinROS: A Linux-based Runtime System for Reconfigurable MPSoCs
    Rettkowski, Jens
    Wehner, Philipp
    Cutiscev, Evgheni
    Goehringer, Diana
    2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2016, : 208 - 216
  • [29] RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices
    Liu, Kaizheng
    Yang, Ming
    Ling, Zhen
    Zhang, Yue
    Lei, Chongqing
    Luo, Junzhou
    Fu, Xinwen
    CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, : 2341 - 2354
  • [30] Detecting IoT Botnets on IoT Edge Devices
    Raghavendra, Meghana
    Chen, Zesheng
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 373 - 378