SlideShare a Scribd company logo
Candidate: Botticelli Biagio
Advisor: Prof. Leonardo Querzoni
Co-Advisor: Dott. Giuseppe Laurenza
Master of Science in Engineering in Computer Science - A.Y. 2016 - 2017
IoT Malware Detection
through
Threshold Random Walks
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 2
Internet of Things
The Internet of Things describes the vision where objects become part of
the Internet: where every object is uniquely identified, and accessible to
the network, its position and status known, where services and
intelligence are added to this expanded Internet, fusing the digital and
physical world into a single one.
6.5 Devices per Person
An increased connectivity leads
to an exponential increase in
the threat surface: more smart
technology we add, more likely
is to be hacked from the point
of view of security.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3
Mirai Example: IoT as a weapon
20th September 2016 : KrebsOnSecurity.com targeted by an
extremely large and unusual Distributed Denial-of-Service
(DDoS) attack of over 660 Gbps of traffic.
Innovative Aspect: the attack was performed by using
direct traffic generated by a botnet of hacked IoT devices
infected by a malware called Mirai.
ThingsBot (or Botnet of Things): automated botnet of
compromised IoT devices (things).
Botmaster
Botnet: robot network of hacked machines (or bots),
which run malicious code under the remote command and
control (C&C) of a botmaster for many malicious activities.
IoT as weapon: from Internet of Things
to Internet of Threats!
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3
Mirai Example: IoT as a weapon
20th September 2016 : KrebsOnSecurity.com targeted by an
extremely large and unusual Distributed Denial-of-Service
(DDoS) attack of over 660 Gbps of traffic.
Innovative Aspect: the attack was performed by using
direct traffic generated by a botnet of hacked IoT devices
infected by a malware called Mirai.
ThingsBot (or Botnet of Things): automated botnet of
compromised IoT devices (things).
Botmaster
Botnet: robot network of hacked machines (or bots),
which run malicious code under the remote command and
control (C&C) of a botmaster for many malicious activities.
IoT as weapon: from Internet of Things
to Internet of Threats!
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 4
IoT Malware
AidraMirai
Tsunami
Linux.Hydra
Chuck Norris Psyb0t
Hajime
Linux/IRCTelnet
LightAidra
RemaintenBASHLITE
Predecessor Successor
Influenced
LEGEND
2008
200920102010
2013
2014 2016
2016
2016
2016
2014
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 5
Related Works
• Honeypharm: “the more honeypots there are in different networks , the higher are the chances
to capture new malware samples”.
Key Concept: Distributed Architecture of low-interaction honeypots
• IoTPOT: “the more embedded services are emulated for different CPU architectures, the more
information on existing IoT malware can be obtained”.
Key Concept: Emulation of embedded services for different architectures
• SIPHON: “rather than emulated embedded services, the use of real-existing high interactive
vulnerable IoT devices improves results in attracting cyber-criminals”.
Key Concept: Real embedded vulnerable IoT devices offered to attackers
• Fast Port-scan Detection using SHT: ”the Threshold Random Walk algorithm could be used to
effectively detect the reconnaissance phase of network attacks”.
Key Concept: Threshold Random Walk applied for Malware Detection
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 6
Problem Statement & Thesis Contributions
Problem Statement: devices of the Internet of Things are under constant attack of cyber-criminals
since they are typically low secured (or completely unsecure). However, we cannot adopt
traditional lines of defense for malware detection due to computational resource constraints.
Thesis Contributions: design and implement an online detection Threshold Random Walk-
based algorithm which is fast, light and capable to identify attacks even with the low resources
of Internet of Things sensors and objects.
To get more knowledge of attack techniques performed by IoT malware, a Distributed
Architecture of honeypots had been implemented. This architecture should attract modern
attack patterns and capture samples of the newest threats from different locations in the world.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 7
Distributed Honeypot Architecture
Automated Procedure: the DIAG VM daily connects to Cowrie instance in New York and to Cowrie-Dumper
in Singapore to locally download all the obtained data (logs and malware samples) and to restore the
initial honeypot configuration.
Cowrie

in New York

IP: 162.243.211.8
Cowrie-Dumper

in Singapore

IP: 128.199.204.0
DIAG VM

in Rome

IP: 192.168.2.197
DIAG Network
Results: a total number of 332 970 attacking sessions were collected (~100 Gb of data).
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 8
Distribution of Top 15 Attacking IPs - NY
New York Cowrie: 294 943 connections, 53 718 originated by different IPs.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 9
Distribution of Top 15 Attack IPs - Singapore
Singapore Cowrie-Dumper: 50 897 connections, 15 250 originated by different IPs.
Observation 2: Only 299 IPs attacked both
New York and Singapore honeypot instances.
Observation 1: Italy is 18th with 133 IPs.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 10
Threshold Random Walk
η1
η0
η2
time
Y1
Y2
Y3
Y4
Y5
Y6
Y7
Y8
Y9
Y10
Λ(Y)
WARNING
H1 = ATTACK
H0 = LEGAL
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Medium
Attack Probability:
70%
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Medium
Attack Probability:
70%
Low
Attack Probability:
60%
Dangerous
Attack Probability:
99%
Knowledge Base
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 12
TRW as Binary Classification Problem
TRW detection is a binary classification problem in which the output is chosen among two hypotheses:
• TP - Detection: TRW selects H1, detecting the
interaction as an attack and H1 is in fact True.
• FP - False Positive - Type I Error: TRW selects H1
(attack) when H0 is in fact True;
TRW receives a legitimate interaction as input
and it detects the connection as malicious.
• FN - False Negative - Type II Error: TRW chooses H0
(legal), but H1 was True;
TRW receives a malicious interaction as input
and it detects the connection as legitimate.
• TN - Nominal: TRW picks H0 when H0 is in fact True.
Binary Classification
Confusion Matrix
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 13
How does the Threshold Random Walk perform? Is it correctly formulated?
Experiment 1: k-Fold Cross Validation
Dataset 1: all attacking sessions captured by honeypots between 24th April and 31st October 2017.
270 379 malicious interactions in total.
k-Fold Cross Validation: the data is divided into k subsets of the same size. Each one of the k subsets is
used once as the validation set and the other k−1 subsets are put together to form the training set.
In cases of large imbalance in the dataset, stratified approach folds are created containing approximately
the same percentage of samples of each target class as the complete set.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 14
Experiment 1: Average Metrics Results
Standard
Deviation
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 15
TRW has very good
performances even on
potentially unknown
attack sessions formed
by new attack strings
never seen before.
Experiment 2: Metrics Results
Dataset 2: all “new” attacking sessions captured in the last months of November and December 2017.
125 182 total interactions: equally divided in 62 591 new malicious and 62 591 legal logs.
How does the Threshold Random Walk perform in case of “unknown” attacking sessions?
How does the algorithm behave in terms of number of commands necessary to carry out the detection?
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 16
Experiment 2: Detection Performances
Threshold Random
W a l k d e t e c t s a
malicious series of
commands in ~ 6,44
events on average
with a maximum of 9
commands required.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 17
Experiment 3: Detection vs. Execution
Average Length
at Detection
Dataset 3: all “complete” attacking sessions formed by series of commands that would actually infect a device.
114 226 logs = ~34.305% of 332 970 total interactions
Each interaction has the characteristic of having at least one command to sample execution.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 18
Conclusions & Future Works
Conclusions: experiments proved that Threshold Random Walk outcomes promising results. It’s:
• Fast: detection of malicious interactions id performed in early stages of attacking sessions;
• Lightweight: no particular computing requirements;
• Extensible: upgradeable knowledge base allows to include emerging new attack techniques;
• Efficient: TRW makes the correct decision on quite all observed malicious sequences of commands.
Future Works:

• SSH/Telnet Emulation: create a Telnet/SSH traffic sampling system on a real communication channel.
• Automation of KB Creation: design an automated process that integrates into the existing KB new
discovered attack strings, without necessarily having to start its creation from scratch.
• Architecture Improvement: new honeypot solution could be integrated in the existing architecture.
• ELK Framework: ElasticSearch, LogStash and Kibana Data Analytics tool could be integrated into the
DIAG VM server to have a visual report of collected data in structured file formats (.json files).
“A secure system is one that does what is supposed to do, and nothing more”.
J.B. Ippolito, Native Intelligence, Inc.
Any Question?
Biagio Botticelli - botticelli.1212666@studenti.uniroma1.it

M.Sc. in Engineering in Computer Science
Thank You!
“A secure system is one that does what is supposed to do, and nothing more”.
J.B. Ippolito, Native Intelligence, Inc.
Any Question?
Ad

More Related Content

What's hot (20)

Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
Applied Forensic Research Sciences
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
Dhrumil Panchal
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Web scraping
Web scrapingWeb scraping
Web scraping
Selecto
 
Face Mask Detection PPT.pptx
Face Mask Detection PPT.pptxFace Mask Detection PPT.pptx
Face Mask Detection PPT.pptx
Srikar Dasharadhi
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
anupriti
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdf
Shylesh BC
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
omarShiekh1
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Traditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer CrimeTraditional Problems Associated with Computer Crime
Traditional Problems Associated with Computer Crime
Dhrumil Panchal
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Web scraping
Web scrapingWeb scraping
Web scraping
Selecto
 
Face Mask Detection PPT.pptx
Face Mask Detection PPT.pptxFace Mask Detection PPT.pptx
Face Mask Detection PPT.pptx
Srikar Dasharadhi
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
anupriti
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdf
Shylesh BC
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
omarShiekh1
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
 

Similar to IoT Malware Detection through Threshold Random Walks (20)

Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Classifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detectionClassifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detection
Fabrizio Farinacci
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
Avast
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
IJCSES Journal
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Classifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detectionClassifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detection
Fabrizio Farinacci
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Avast @ Machine Learning
Avast @ Machine LearningAvast @ Machine Learning
Avast @ Machine Learning
Avast
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
IJCSES Journal
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
Ad

More from Biagio Botticelli (10)

Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
Biagio Botticelli
 
Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1
Biagio Botticelli
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
Biagio Botticelli
 
State of the Art: IoT Honeypots
State of the Art: IoT HoneypotsState of the Art: IoT Honeypots
State of the Art: IoT Honeypots
Biagio Botticelli
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
Biagio Botticelli
 
Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking
Biagio Botticelli
 
Adafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi BoardAdafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi Board
Biagio Botticelli
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
Biagio Botticelli
 
Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1
Biagio Botticelli
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
Biagio Botticelli
 
State of the Art: IoT Honeypots
State of the Art: IoT HoneypotsState of the Art: IoT Honeypots
State of the Art: IoT Honeypots
Biagio Botticelli
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
Biagio Botticelli
 
Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking
Biagio Botticelli
 
Adafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi BoardAdafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi Board
Biagio Botticelli
 
Ad

Recently uploaded (20)

Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Domain1_Security_Principles --(My_Notes)
Domain1_Security_Principles --(My_Notes)Domain1_Security_Principles --(My_Notes)
Domain1_Security_Principles --(My_Notes)
efs14135
 
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
SanjeetMishra29
 
Environment .................................
Environment .................................Environment .................................
Environment .................................
shadyozq9
 
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptxUnleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
SanjeetMishra29
 
Espresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptxEspresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptx
NingChacha1
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023
Rajesh Prasad
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
HSE Induction for heat stress work .pptx
HSE Induction for heat stress work .pptxHSE Induction for heat stress work .pptx
HSE Induction for heat stress work .pptx
agraahmed
 
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
abdokhattab2015
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
PYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptxPYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptx
rmvigram
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 
Domain1_Security_Principles --(My_Notes)
Domain1_Security_Principles --(My_Notes)Domain1_Security_Principles --(My_Notes)
Domain1_Security_Principles --(My_Notes)
efs14135
 
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
🚀 TDX Bengaluru 2025 Unwrapped: Key Highlights, Innovations & Trailblazer Tak...
SanjeetMishra29
 
Environment .................................
Environment .................................Environment .................................
Environment .................................
shadyozq9
 
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptxUnleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
Unleashing the Power of Salesforce Flows &amp_ Slack Integration!.pptx
SanjeetMishra29
 
Espresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptxEspresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptx
NingChacha1
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023
Rajesh Prasad
 
HSE Induction for heat stress work .pptx
HSE Induction for heat stress work .pptxHSE Induction for heat stress work .pptx
HSE Induction for heat stress work .pptx
agraahmed
 
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
7- Bearing..pptx 7- Bearing..pptx7- Bearing..pptx
abdokhattab2015
 
AI Chatbots & Software Development Teams
AI Chatbots & Software Development TeamsAI Chatbots & Software Development Teams
AI Chatbots & Software Development Teams
Joe Krall
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
PYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptxPYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptx
rmvigram
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 

IoT Malware Detection through Threshold Random Walks

  • 1. Candidate: Botticelli Biagio Advisor: Prof. Leonardo Querzoni Co-Advisor: Dott. Giuseppe Laurenza Master of Science in Engineering in Computer Science - A.Y. 2016 - 2017 IoT Malware Detection through Threshold Random Walks
  • 2. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 2 Internet of Things The Internet of Things describes the vision where objects become part of the Internet: where every object is uniquely identified, and accessible to the network, its position and status known, where services and intelligence are added to this expanded Internet, fusing the digital and physical world into a single one. 6.5 Devices per Person An increased connectivity leads to an exponential increase in the threat surface: more smart technology we add, more likely is to be hacked from the point of view of security.
  • 3. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3 Mirai Example: IoT as a weapon 20th September 2016 : KrebsOnSecurity.com targeted by an extremely large and unusual Distributed Denial-of-Service (DDoS) attack of over 660 Gbps of traffic. Innovative Aspect: the attack was performed by using direct traffic generated by a botnet of hacked IoT devices infected by a malware called Mirai. ThingsBot (or Botnet of Things): automated botnet of compromised IoT devices (things). Botmaster Botnet: robot network of hacked machines (or bots), which run malicious code under the remote command and control (C&C) of a botmaster for many malicious activities. IoT as weapon: from Internet of Things to Internet of Threats!
  • 4. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3 Mirai Example: IoT as a weapon 20th September 2016 : KrebsOnSecurity.com targeted by an extremely large and unusual Distributed Denial-of-Service (DDoS) attack of over 660 Gbps of traffic. Innovative Aspect: the attack was performed by using direct traffic generated by a botnet of hacked IoT devices infected by a malware called Mirai. ThingsBot (or Botnet of Things): automated botnet of compromised IoT devices (things). Botmaster Botnet: robot network of hacked machines (or bots), which run malicious code under the remote command and control (C&C) of a botmaster for many malicious activities. IoT as weapon: from Internet of Things to Internet of Threats!
  • 5. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 4 IoT Malware AidraMirai Tsunami Linux.Hydra Chuck Norris Psyb0t Hajime Linux/IRCTelnet LightAidra RemaintenBASHLITE Predecessor Successor Influenced LEGEND 2008 200920102010 2013 2014 2016 2016 2016 2016 2014
  • 6. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 5 Related Works • Honeypharm: “the more honeypots there are in different networks , the higher are the chances to capture new malware samples”. Key Concept: Distributed Architecture of low-interaction honeypots • IoTPOT: “the more embedded services are emulated for different CPU architectures, the more information on existing IoT malware can be obtained”. Key Concept: Emulation of embedded services for different architectures • SIPHON: “rather than emulated embedded services, the use of real-existing high interactive vulnerable IoT devices improves results in attracting cyber-criminals”. Key Concept: Real embedded vulnerable IoT devices offered to attackers • Fast Port-scan Detection using SHT: ”the Threshold Random Walk algorithm could be used to effectively detect the reconnaissance phase of network attacks”. Key Concept: Threshold Random Walk applied for Malware Detection
  • 7. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 6 Problem Statement & Thesis Contributions Problem Statement: devices of the Internet of Things are under constant attack of cyber-criminals since they are typically low secured (or completely unsecure). However, we cannot adopt traditional lines of defense for malware detection due to computational resource constraints. Thesis Contributions: design and implement an online detection Threshold Random Walk- based algorithm which is fast, light and capable to identify attacks even with the low resources of Internet of Things sensors and objects. To get more knowledge of attack techniques performed by IoT malware, a Distributed Architecture of honeypots had been implemented. This architecture should attract modern attack patterns and capture samples of the newest threats from different locations in the world.
  • 8. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 7 Distributed Honeypot Architecture Automated Procedure: the DIAG VM daily connects to Cowrie instance in New York and to Cowrie-Dumper in Singapore to locally download all the obtained data (logs and malware samples) and to restore the initial honeypot configuration. Cowrie in New York IP: 162.243.211.8 Cowrie-Dumper in Singapore IP: 128.199.204.0 DIAG VM in Rome IP: 192.168.2.197 DIAG Network Results: a total number of 332 970 attacking sessions were collected (~100 Gb of data).
  • 9. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 8 Distribution of Top 15 Attacking IPs - NY New York Cowrie: 294 943 connections, 53 718 originated by different IPs.
  • 10. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 9 Distribution of Top 15 Attack IPs - Singapore Singapore Cowrie-Dumper: 50 897 connections, 15 250 originated by different IPs. Observation 2: Only 299 IPs attacked both New York and Singapore honeypot instances. Observation 1: Italy is 18th with 133 IPs.
  • 11. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 10 Threshold Random Walk η1 η0 η2 time Y1 Y2 Y3 Y4 Y5 Y6 Y7 Y8 Y9 Y10 Λ(Y) WARNING H1 = ATTACK H0 = LEGAL
  • 12. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness.
  • 13. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. Dangerous Attack Probability: 99% Knowledge Base
  • 14. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Dangerous Attack Probability: 99% Knowledge Base
  • 15. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Medium Attack Probability: 70% Dangerous Attack Probability: 99% Knowledge Base
  • 16. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Medium Attack Probability: 70% Low Attack Probability: 60% Dangerous Attack Probability: 99% Knowledge Base
  • 17. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 12 TRW as Binary Classification Problem TRW detection is a binary classification problem in which the output is chosen among two hypotheses: • TP - Detection: TRW selects H1, detecting the interaction as an attack and H1 is in fact True. • FP - False Positive - Type I Error: TRW selects H1 (attack) when H0 is in fact True; TRW receives a legitimate interaction as input and it detects the connection as malicious. • FN - False Negative - Type II Error: TRW chooses H0 (legal), but H1 was True; TRW receives a malicious interaction as input and it detects the connection as legitimate. • TN - Nominal: TRW picks H0 when H0 is in fact True. Binary Classification Confusion Matrix
  • 18. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 13 How does the Threshold Random Walk perform? Is it correctly formulated? Experiment 1: k-Fold Cross Validation Dataset 1: all attacking sessions captured by honeypots between 24th April and 31st October 2017. 270 379 malicious interactions in total. k-Fold Cross Validation: the data is divided into k subsets of the same size. Each one of the k subsets is used once as the validation set and the other k−1 subsets are put together to form the training set. In cases of large imbalance in the dataset, stratified approach folds are created containing approximately the same percentage of samples of each target class as the complete set.
  • 19. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 14 Experiment 1: Average Metrics Results Standard Deviation
  • 20. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 15 TRW has very good performances even on potentially unknown attack sessions formed by new attack strings never seen before. Experiment 2: Metrics Results Dataset 2: all “new” attacking sessions captured in the last months of November and December 2017. 125 182 total interactions: equally divided in 62 591 new malicious and 62 591 legal logs. How does the Threshold Random Walk perform in case of “unknown” attacking sessions? How does the algorithm behave in terms of number of commands necessary to carry out the detection?
  • 21. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 16 Experiment 2: Detection Performances Threshold Random W a l k d e t e c t s a malicious series of commands in ~ 6,44 events on average with a maximum of 9 commands required.
  • 22. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 17 Experiment 3: Detection vs. Execution Average Length at Detection Dataset 3: all “complete” attacking sessions formed by series of commands that would actually infect a device. 114 226 logs = ~34.305% of 332 970 total interactions Each interaction has the characteristic of having at least one command to sample execution.
  • 23. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 18 Conclusions & Future Works Conclusions: experiments proved that Threshold Random Walk outcomes promising results. It’s: • Fast: detection of malicious interactions id performed in early stages of attacking sessions; • Lightweight: no particular computing requirements; • Extensible: upgradeable knowledge base allows to include emerging new attack techniques; • Efficient: TRW makes the correct decision on quite all observed malicious sequences of commands. Future Works: • SSH/Telnet Emulation: create a Telnet/SSH traffic sampling system on a real communication channel. • Automation of KB Creation: design an automated process that integrates into the existing KB new discovered attack strings, without necessarily having to start its creation from scratch. • Architecture Improvement: new honeypot solution could be integrated in the existing architecture. • ELK Framework: ElasticSearch, LogStash and Kibana Data Analytics tool could be integrated into the DIAG VM server to have a visual report of collected data in structured file formats (.json files).
  • 24. “A secure system is one that does what is supposed to do, and nothing more”. J.B. Ippolito, Native Intelligence, Inc. Any Question?
  • 25. Biagio Botticelli - botticelli.1212666@studenti.uniroma1.it M.Sc. in Engineering in Computer Science Thank You! “A secure system is one that does what is supposed to do, and nothing more”. J.B. Ippolito, Native Intelligence, Inc. Any Question?
  翻译: