Bezerra Vitor Hugo, da Costa Victor Guilherme Turrisi, Barbon Junior Sylvio, Miani Rodrigo Sanches, Zarpelão Bruno Bogaz
Computer Science Department, State University of Londrina (UEL), Londrina PR 86057-970, Brazil.
School of Computer Science, Federal University of Uberlândia (UFU), Uberlândia MG 38400-902, Brazil.
Sensors (Basel). 2019 Jul 19;19(14):3188. doi: 10.3390/s19143188.
Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device's behaviour, the approach extracts features from the device's CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device's energy consumption, and CPU and memory utilisation.
物联网(IoT)设备越来越普及。尽管这些设备有改善多个应用领域的潜力,但它们的安全性较差,攻击者可以利用这一点构建大规模僵尸网络。在这项工作中,我们提出了一种基于主机的方法来检测物联网设备中的僵尸网络,名为IoTDS(物联网检测系统)。它依赖于单类分类器,该分类器仅对合法设备行为进行建模,以便进一步检测偏差,避免了手动标记过程。所提出的解决方案以基于HTTPS的新型代理-管理器架构为支撑,可防止物联网设备因训练活动而过载。为了分析设备的行为,该方法从设备的CPU利用率、温度、内存消耗和运行任务数量中提取特征,这意味着它不使用网络流量数据。为了测试我们的方法,我们使用了一个包含受僵尸恶意软件感染的设备的实验性物联网设置。创建了多个场景,包括三种不同的物联网设备配置文件和七个僵尸网络。评估了四种单类算法(椭圆包络、孤立森林、局部离群因子和单类支持向量机)。结果表明,所提出的系统对不同的僵尸网络具有良好的预测性能,性能最佳的算法局部离群因子的平均F1分数达到94%。该系统对设备的能源消耗、CPU和内存利用率的影响也很低。