Improving ML Detection of IoT Botnets using Comprehensive Data and Feature Sets

被引:2
|
作者
Mehra, Misha [1 ]
Paranjape, Jay N. [1 ]
Ribeiro, Vinay J. [1 ]
机构
[1] Indian Inst Technol Delhi, Comp Sci & Engn, Delhi, India
关键词
IoT Botnet; IoT Security; Machine Learning; Malware Analysis; Sandboxing;
D O I
10.1109/COMSNETS51098.2021.9352943
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, the world has seen a tremendous increase in the number of attacks on IoT devices. A majority of these attacks have been botnet attacks, where an army of compromised IoT devices is used to launch DDoS attacks on targeted systems. In this paper, we study how the choice of a dataset and the extracted features determine the performance of a Machine Learning model, given the task of classifying Linux Binaries (ELFs) as being benign or malicious. Our work focuses on Linux systems since embedded Linux is the more popular choice for building today's IoT devices and systems. We propose using 4 different types of files as the dataset for any ML model. These include system files, IoT application files, IoT botnet files and general malware files. Further, we propose using static, dynamic as well as network features to do the classification task. We show that existing methods leave out one or the other features, or file types and hence, our model outperforms them in terms of accuracy in detecting these files. While enhancing the dataset adds to the robustness of a model, utilizing all 3 types of features decreases the false positive and false negative rates non-trivially. We employ an exhaustive scenario based method for evaluating a ML model and show the importance of including each of the proposed files in a dataset. We also analyze the features and try to explain their importance for a model, using observed trends in different benign and malicious files. We perform feature extraction using the open source Limon sandbox, which prior to this work has been tested only on Ubuntu 14. We installed and configured it for Ubuntu 18, the documentation of which has been shared on Github.
引用
收藏
页码:438 / 446
页数:9
相关论文
共 50 条
  • [1] ML-Based Early Detection of IoT Botnets
    Kumar, Ayush
    Shridhar, Mrinalini
    Swaminathan, Sahithya
    Lim, Teng Joon
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 254 - 260
  • [2] From Data to Defense: Real-Time Detection of Botnets in IoT Using LSTM Networks
    Sadeghpour, Shadi
    Zareen, Farhath
    Johnson, William A.
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 605 - 611
  • [3] Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning
    Kim, Jiyeon
    Shim, Minsun
    Hong, Seungah
    Shin, Yulim
    Choi, Eunjung
    APPLIED SCIENCES-BASEL, 2020, 10 (19): : 1 - 22
  • [4] Improving ML/DL Solutions for Anomaly Detection in IoT Environments
    Tamani, Nouredine
    El-Jaouhari, Saad
    Khan, Abdul-Qadir
    Pauchet, Bastien
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024, 2024, 204 : 193 - 206
  • [5] IoT Device Authentication Using Self-Organizing Feature Map Data Sets
    Nair, Manish
    Dang, Shuping
    Beach, Mark. A.
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (09) : 162 - 168
  • [6] Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
    Mirzai, Aria
    Coban, Ali Zulfukar
    Almgren, Magnus
    Aoudi, Wissam
    Bertilsson, Tobias
    PROCEEDINGS OF THE 2023 EUROPEAN WORKSHOP ON SYSTEM SECURITY, EUROSEC 2023, 2023, : 44 - 50
  • [7] Improving CT-image universal lesion detection with comprehensive data and feature enhancements
    Zhe Liu
    Kai Han
    Kaifeng Xue
    Yuqing Song
    Lu Liu
    Yangyang Tang
    Yan Zhu
    Multimedia Systems, 2022, 28 : 1741 - 1752
  • [8] Improving CT-image universal lesion detection with comprehensive data and feature enhancements
    Liu, Zhe
    Han, Kai
    Xue, Kaifeng
    Song, Yuqing
    Liu, Lu
    Tang, Yangyang
    Zhu, Yan
    MULTIMEDIA SYSTEMS, 2022, 28 (05) : 1741 - 1752
  • [9] On the Comparison of Malware Detection Methods Using Data Mining with Two Feature Sets
    Srakaew, Sathaporn
    Piyanuntcharatsr, Warot
    Adulkasem, Suchitra
    Chantrapornchai, Chantana
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 293 - 318
  • [10] Improving Image Matting using Comprehensive Sampling Sets
    Shahrian, Ehsan
    Rajan, Deepu
    Price, Brian
    Cohen, Scott
    2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2013, : 636 - 643