SlideShare a Scribd company logo
Candidate: Botticelli Biagio
Advisor: Prof. Leonardo Querzoni
Co-Advisor: Dott. Giuseppe Laurenza
Master of Science in Engineering in Computer Science - A.Y. 2016 - 2017
IoT Malware Detection
through
Threshold Random Walks
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 2
Internet of Things
The Internet of Things describes the vision where objects become part of
the Internet: where every object is uniquely identified, and accessible to
the network, its position and status known, where services and
intelligence are added to this expanded Internet, fusing the digital and
physical world into a single one.
6.5 Devices per Person
An increased connectivity leads
to an exponential increase in
the threat surface: more smart
technology we add, more likely
is to be hacked from the point
of view of security.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3
Mirai Example: IoT as a weapon
20th September 2016 : KrebsOnSecurity.com targeted by an
extremely large and unusual Distributed Denial-of-Service
(DDoS) attack of over 660 Gbps of traffic.
Innovative Aspect: the attack was performed by using
direct traffic generated by a botnet of hacked IoT devices
infected by a malware called Mirai.
ThingsBot (or Botnet of Things): automated botnet of
compromised IoT devices (things).
Botmaster
Botnet: robot network of hacked machines (or bots),
which run malicious code under the remote command and
control (C&C) of a botmaster for many malicious activities.
IoT as weapon: from Internet of Things
to Internet of Threats!
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3
Mirai Example: IoT as a weapon
20th September 2016 : KrebsOnSecurity.com targeted by an
extremely large and unusual Distributed Denial-of-Service
(DDoS) attack of over 660 Gbps of traffic.
Innovative Aspect: the attack was performed by using
direct traffic generated by a botnet of hacked IoT devices
infected by a malware called Mirai.
ThingsBot (or Botnet of Things): automated botnet of
compromised IoT devices (things).
Botmaster
Botnet: robot network of hacked machines (or bots),
which run malicious code under the remote command and
control (C&C) of a botmaster for many malicious activities.
IoT as weapon: from Internet of Things
to Internet of Threats!
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 4
IoT Malware
AidraMirai
Tsunami
Linux.Hydra
Chuck Norris Psyb0t
Hajime
Linux/IRCTelnet
LightAidra
RemaintenBASHLITE
Predecessor Successor
Influenced
LEGEND
2008
200920102010
2013
2014 2016
2016
2016
2016
2014
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 5
Related Works
• Honeypharm: “the more honeypots there are in different networks , the higher are the chances
to capture new malware samples”.
Key Concept: Distributed Architecture of low-interaction honeypots
• IoTPOT: “the more embedded services are emulated for different CPU architectures, the more
information on existing IoT malware can be obtained”.
Key Concept: Emulation of embedded services for different architectures
• SIPHON: “rather than emulated embedded services, the use of real-existing high interactive
vulnerable IoT devices improves results in attracting cyber-criminals”.
Key Concept: Real embedded vulnerable IoT devices offered to attackers
• Fast Port-scan Detection using SHT: ”the Threshold Random Walk algorithm could be used to
effectively detect the reconnaissance phase of network attacks”.
Key Concept: Threshold Random Walk applied for Malware Detection
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 6
Problem Statement & Thesis Contributions
Problem Statement: devices of the Internet of Things are under constant attack of cyber-criminals
since they are typically low secured (or completely unsecure). However, we cannot adopt
traditional lines of defense for malware detection due to computational resource constraints.
Thesis Contributions: design and implement an online detection Threshold Random Walk-
based algorithm which is fast, light and capable to identify attacks even with the low resources
of Internet of Things sensors and objects.
To get more knowledge of attack techniques performed by IoT malware, a Distributed
Architecture of honeypots had been implemented. This architecture should attract modern
attack patterns and capture samples of the newest threats from different locations in the world.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 7
Distributed Honeypot Architecture
Automated Procedure: the DIAG VM daily connects to Cowrie instance in New York and to Cowrie-Dumper
in Singapore to locally download all the obtained data (logs and malware samples) and to restore the
initial honeypot configuration.
Cowrie

in New York

IP: 162.243.211.8
Cowrie-Dumper

in Singapore

IP: 128.199.204.0
DIAG VM

in Rome

IP: 192.168.2.197
DIAG Network
Results: a total number of 332 970 attacking sessions were collected (~100 Gb of data).
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 8
Distribution of Top 15 Attacking IPs - NY
New York Cowrie: 294 943 connections, 53 718 originated by different IPs.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 9
Distribution of Top 15 Attack IPs - Singapore
Singapore Cowrie-Dumper: 50 897 connections, 15 250 originated by different IPs.
Observation 2: Only 299 IPs attacked both
New York and Singapore honeypot instances.
Observation 1: Italy is 18th with 133 IPs.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 10
Threshold Random Walk
η1
η0
η2
time
Y1
Y2
Y3
Y4
Y5
Y6
Y7
Y8
Y9
Y10
Λ(Y)
WARNING
H1 = ATTACK
H0 = LEGAL
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Medium
Attack Probability:
70%
Dangerous
Attack Probability:
99%
Knowledge Base
Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11
Attack Patterns & Attack Groups
• Initial Shell Pattern 

• Busybox & Busybox Checks

• Connectors

• Malware Download

• Hexadecimal Code
• Malware Creation

• System Exploration

• Kill Processes

• Fingerprinting

• Suspect Files
Dangerousness: the degree of danger of
the command is given by the command
type, contextualized within the type of
interaction that we are considering.
Attack Groups: “fast” data structures in
which to store attack strings, classified
according to their dangerousness.
High
Attack Probability:
90%
Medium
Attack Probability:
70%
Low
Attack Probability:
60%
Dangerous
Attack Probability:
99%
Knowledge Base
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 12
TRW as Binary Classification Problem
TRW detection is a binary classification problem in which the output is chosen among two hypotheses:
• TP - Detection: TRW selects H1, detecting the
interaction as an attack and H1 is in fact True.
• FP - False Positive - Type I Error: TRW selects H1
(attack) when H0 is in fact True;
TRW receives a legitimate interaction as input
and it detects the connection as malicious.
• FN - False Negative - Type II Error: TRW chooses H0
(legal), but H1 was True;
TRW receives a malicious interaction as input
and it detects the connection as legitimate.
• TN - Nominal: TRW picks H0 when H0 is in fact True.
Binary Classification
Confusion Matrix
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 13
How does the Threshold Random Walk perform? Is it correctly formulated?
Experiment 1: k-Fold Cross Validation
Dataset 1: all attacking sessions captured by honeypots between 24th April and 31st October 2017.
270 379 malicious interactions in total.
k-Fold Cross Validation: the data is divided into k subsets of the same size. Each one of the k subsets is
used once as the validation set and the other k−1 subsets are put together to form the training set.
In cases of large imbalance in the dataset, stratified approach folds are created containing approximately
the same percentage of samples of each target class as the complete set.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 14
Experiment 1: Average Metrics Results
Standard
Deviation
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 15
TRW has very good
performances even on
potentially unknown
attack sessions formed
by new attack strings
never seen before.
Experiment 2: Metrics Results
Dataset 2: all “new” attacking sessions captured in the last months of November and December 2017.
125 182 total interactions: equally divided in 62 591 new malicious and 62 591 legal logs.
How does the Threshold Random Walk perform in case of “unknown” attacking sessions?
How does the algorithm behave in terms of number of commands necessary to carry out the detection?
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 16
Experiment 2: Detection Performances
Threshold Random
W a l k d e t e c t s a
malicious series of
commands in ~ 6,44
events on average
with a maximum of 9
commands required.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 17
Experiment 3: Detection vs. Execution
Average Length
at Detection
Dataset 3: all “complete” attacking sessions formed by series of commands that would actually infect a device.
114 226 logs = ~34.305% of 332 970 total interactions
Each interaction has the characteristic of having at least one command to sample execution.
IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 18
Conclusions & Future Works
Conclusions: experiments proved that Threshold Random Walk outcomes promising results. It’s:
• Fast: detection of malicious interactions id performed in early stages of attacking sessions;
• Lightweight: no particular computing requirements;
• Extensible: upgradeable knowledge base allows to include emerging new attack techniques;
• Efficient: TRW makes the correct decision on quite all observed malicious sequences of commands.
Future Works:

• SSH/Telnet Emulation: create a Telnet/SSH traffic sampling system on a real communication channel.
• Automation of KB Creation: design an automated process that integrates into the existing KB new
discovered attack strings, without necessarily having to start its creation from scratch.
• Architecture Improvement: new honeypot solution could be integrated in the existing architecture.
• ELK Framework: ElasticSearch, LogStash and Kibana Data Analytics tool could be integrated into the
DIAG VM server to have a visual report of collected data in structured file formats (.json files).
“A secure system is one that does what is supposed to do, and nothing more”.
J.B. Ippolito, Native Intelligence, Inc.
Any Question?
Biagio Botticelli - botticelli.1212666@studenti.uniroma1.it

M.Sc. in Engineering in Computer Science
Thank You!
“A secure system is one that does what is supposed to do, and nothing more”.
J.B. Ippolito, Native Intelligence, Inc.
Any Question?
Ad

Recommended

Introduction to cyber security
Introduction to cyber security
Self-employed
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyber
Jahangirnagar University
 
Ethical hacking
Ethical hacking
Naveen Sihag
 
Hacking
Hacking
pranav patade
 
Snake Detection in Agricultural Fields using IoT
Snake Detection in Agricultural Fields using IoT
IRJET Journal
 
Device Hacking
Device Hacking
Damian T. Gordon
 
Introduction to ethical hacking
Introduction to ethical hacking
Vikram Khanna
 
IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Active and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
AI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Threat analysis-perception
Threat analysis-perception
zaffar abbasi
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Social engineering presentation
Social engineering presentation
pooja_doshi
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Cyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber security with ai
Cyber security with ai
Burhan Ahmed
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 
Cyber attack
Cyber attack
Manjushree Mashal
 
malware analysis
malware analysis
20CS201AkashR
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Classifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detection
Fabrizio Farinacci
 

More Related Content

What's hot (20)

Active and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
AI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Threat analysis-perception
Threat analysis-perception
zaffar abbasi
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Social engineering presentation
Social engineering presentation
pooja_doshi
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Cyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber security with ai
Cyber security with ai
Burhan Ahmed
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 
Cyber attack
Cyber attack
Manjushree Mashal
 
malware analysis
malware analysis
20CS201AkashR
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Active and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
Pratap Dangeti
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Jowin John Chemban
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
B R SOFTECH PVT LTD
 
AI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
Graham Mann
 
Threat analysis-perception
Threat analysis-perception
zaffar abbasi
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Social engineering presentation
Social engineering presentation
pooja_doshi
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
Anujashejwal
 
Cyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber security with ai
Cyber security with ai
Burhan Ahmed
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 

Similar to IoT Malware Detection through Threshold Random Walks (20)

Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Classifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detection
Fabrizio Farinacci
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Avast @ Machine Learning
Avast @ Machine Learning
Avast
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
Iot(security)
Iot(security)
Shreya Pohekar
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A Survey
IJCSES Journal
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
IoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
beware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
Farjad Noor
 
Classifying IoT malware delivery patterns for attack detection
Classifying IoT malware delivery patterns for attack detection
Fabrizio Farinacci
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Avast @ Machine Learning
Avast @ Machine Learning
Avast
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
ijwmn
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
 
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
[Hitcon 2019] Some things about recent Internet IoT/ICS attacks - a perspecti...
Canaan Kao
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IJCNCJournal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A Survey
IJCSES Journal
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
IRJET Journal
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
beware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
dorishigh
 
Ad

More from Biagio Botticelli (10)

Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
Biagio Botticelli
 
Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1
Biagio Botticelli
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the Art
Biagio Botticelli
 
State of the Art: IoT Honeypots
State of the Art: IoT Honeypots
Biagio Botticelli
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
Biagio Botticelli
 
Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking
Biagio Botticelli
 
Adafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi Board
Biagio Botticelli
 
Control of Communication and Energy Networks Final Project - Service Function...
Control of Communication and Energy Networks Final Project - Service Function...
Biagio Botticelli
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
Biagio Botticelli
 
Web Information Retrieval - Homework 1
Web Information Retrieval - Homework 1
Biagio Botticelli
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the Art
Biagio Botticelli
 
State of the Art: IoT Honeypots
State of the Art: IoT Honeypots
Biagio Botticelli
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
Biagio Botticelli
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
Biagio Botticelli
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
Biagio Botticelli
 
Smart Team Tracking Project: Group Tracking
Smart Team Tracking Project: Group Tracking
Biagio Botticelli
 
Adafruit Huzzah Esp8266 WiFi Board
Adafruit Huzzah Esp8266 WiFi Board
Biagio Botticelli
 
Ad

Recently uploaded (20)

Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Rapid Prototyping for XR: Lecture 3 - Video and Paper Prototyping
Mark Billinghurst
 
NEW Strengthened Senior High School Gen Math.pptx
NEW Strengthened Senior High School Gen Math.pptx
DaryllWhere
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
Microwatt: Open Tiny Core, Big Possibilities
Microwatt: Open Tiny Core, Big Possibilities
IBM
 
دراسة حاله لقرية تقع في جنوب غرب السودان
دراسة حاله لقرية تقع في جنوب غرب السودان
محمد قصص فتوتة
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
retina_biometrics ruet rajshahi bangdesh.pptx
retina_biometrics ruet rajshahi bangdesh.pptx
MdRakibulIslam697135
 
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
Introduction to Natural Language Processing - Stages in NLP Pipeline, Challen...
resming1
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Introduction to Python Programming Language
Introduction to Python Programming Language
merlinjohnsy
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Unit III_One Dimensional Consolidation theory
Unit III_One Dimensional Consolidation theory
saravananr808639
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 

IoT Malware Detection through Threshold Random Walks

  • 1. Candidate: Botticelli Biagio Advisor: Prof. Leonardo Querzoni Co-Advisor: Dott. Giuseppe Laurenza Master of Science in Engineering in Computer Science - A.Y. 2016 - 2017 IoT Malware Detection through Threshold Random Walks
  • 2. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 2 Internet of Things The Internet of Things describes the vision where objects become part of the Internet: where every object is uniquely identified, and accessible to the network, its position and status known, where services and intelligence are added to this expanded Internet, fusing the digital and physical world into a single one. 6.5 Devices per Person An increased connectivity leads to an exponential increase in the threat surface: more smart technology we add, more likely is to be hacked from the point of view of security.
  • 3. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3 Mirai Example: IoT as a weapon 20th September 2016 : KrebsOnSecurity.com targeted by an extremely large and unusual Distributed Denial-of-Service (DDoS) attack of over 660 Gbps of traffic. Innovative Aspect: the attack was performed by using direct traffic generated by a botnet of hacked IoT devices infected by a malware called Mirai. ThingsBot (or Botnet of Things): automated botnet of compromised IoT devices (things). Botmaster Botnet: robot network of hacked machines (or bots), which run malicious code under the remote command and control (C&C) of a botmaster for many malicious activities. IoT as weapon: from Internet of Things to Internet of Threats!
  • 4. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 3 Mirai Example: IoT as a weapon 20th September 2016 : KrebsOnSecurity.com targeted by an extremely large and unusual Distributed Denial-of-Service (DDoS) attack of over 660 Gbps of traffic. Innovative Aspect: the attack was performed by using direct traffic generated by a botnet of hacked IoT devices infected by a malware called Mirai. ThingsBot (or Botnet of Things): automated botnet of compromised IoT devices (things). Botmaster Botnet: robot network of hacked machines (or bots), which run malicious code under the remote command and control (C&C) of a botmaster for many malicious activities. IoT as weapon: from Internet of Things to Internet of Threats!
  • 5. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 4 IoT Malware AidraMirai Tsunami Linux.Hydra Chuck Norris Psyb0t Hajime Linux/IRCTelnet LightAidra RemaintenBASHLITE Predecessor Successor Influenced LEGEND 2008 200920102010 2013 2014 2016 2016 2016 2016 2014
  • 6. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 5 Related Works • Honeypharm: “the more honeypots there are in different networks , the higher are the chances to capture new malware samples”. Key Concept: Distributed Architecture of low-interaction honeypots • IoTPOT: “the more embedded services are emulated for different CPU architectures, the more information on existing IoT malware can be obtained”. Key Concept: Emulation of embedded services for different architectures • SIPHON: “rather than emulated embedded services, the use of real-existing high interactive vulnerable IoT devices improves results in attracting cyber-criminals”. Key Concept: Real embedded vulnerable IoT devices offered to attackers • Fast Port-scan Detection using SHT: ”the Threshold Random Walk algorithm could be used to effectively detect the reconnaissance phase of network attacks”. Key Concept: Threshold Random Walk applied for Malware Detection
  • 7. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 6 Problem Statement & Thesis Contributions Problem Statement: devices of the Internet of Things are under constant attack of cyber-criminals since they are typically low secured (or completely unsecure). However, we cannot adopt traditional lines of defense for malware detection due to computational resource constraints. Thesis Contributions: design and implement an online detection Threshold Random Walk- based algorithm which is fast, light and capable to identify attacks even with the low resources of Internet of Things sensors and objects. To get more knowledge of attack techniques performed by IoT malware, a Distributed Architecture of honeypots had been implemented. This architecture should attract modern attack patterns and capture samples of the newest threats from different locations in the world.
  • 8. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 7 Distributed Honeypot Architecture Automated Procedure: the DIAG VM daily connects to Cowrie instance in New York and to Cowrie-Dumper in Singapore to locally download all the obtained data (logs and malware samples) and to restore the initial honeypot configuration. Cowrie in New York IP: 162.243.211.8 Cowrie-Dumper in Singapore IP: 128.199.204.0 DIAG VM in Rome IP: 192.168.2.197 DIAG Network Results: a total number of 332 970 attacking sessions were collected (~100 Gb of data).
  • 9. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 8 Distribution of Top 15 Attacking IPs - NY New York Cowrie: 294 943 connections, 53 718 originated by different IPs.
  • 10. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 9 Distribution of Top 15 Attack IPs - Singapore Singapore Cowrie-Dumper: 50 897 connections, 15 250 originated by different IPs. Observation 2: Only 299 IPs attacked both New York and Singapore honeypot instances. Observation 1: Italy is 18th with 133 IPs.
  • 11. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 10 Threshold Random Walk η1 η0 η2 time Y1 Y2 Y3 Y4 Y5 Y6 Y7 Y8 Y9 Y10 Λ(Y) WARNING H1 = ATTACK H0 = LEGAL
  • 12. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness.
  • 13. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. Dangerous Attack Probability: 99% Knowledge Base
  • 14. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Dangerous Attack Probability: 99% Knowledge Base
  • 15. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Medium Attack Probability: 70% Dangerous Attack Probability: 99% Knowledge Base
  • 16. Anonymity in the Web based on Routing ProtocolsIoT Malware detection through Threshold Random Walks 11 Attack Patterns & Attack Groups • Initial Shell Pattern • Busybox & Busybox Checks • Connectors • Malware Download • Hexadecimal Code • Malware Creation • System Exploration • Kill Processes • Fingerprinting • Suspect Files Dangerousness: the degree of danger of the command is given by the command type, contextualized within the type of interaction that we are considering. Attack Groups: “fast” data structures in which to store attack strings, classified according to their dangerousness. High Attack Probability: 90% Medium Attack Probability: 70% Low Attack Probability: 60% Dangerous Attack Probability: 99% Knowledge Base
  • 17. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 12 TRW as Binary Classification Problem TRW detection is a binary classification problem in which the output is chosen among two hypotheses: • TP - Detection: TRW selects H1, detecting the interaction as an attack and H1 is in fact True. • FP - False Positive - Type I Error: TRW selects H1 (attack) when H0 is in fact True; TRW receives a legitimate interaction as input and it detects the connection as malicious. • FN - False Negative - Type II Error: TRW chooses H0 (legal), but H1 was True; TRW receives a malicious interaction as input and it detects the connection as legitimate. • TN - Nominal: TRW picks H0 when H0 is in fact True. Binary Classification Confusion Matrix
  • 18. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 13 How does the Threshold Random Walk perform? Is it correctly formulated? Experiment 1: k-Fold Cross Validation Dataset 1: all attacking sessions captured by honeypots between 24th April and 31st October 2017. 270 379 malicious interactions in total. k-Fold Cross Validation: the data is divided into k subsets of the same size. Each one of the k subsets is used once as the validation set and the other k−1 subsets are put together to form the training set. In cases of large imbalance in the dataset, stratified approach folds are created containing approximately the same percentage of samples of each target class as the complete set.
  • 19. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 14 Experiment 1: Average Metrics Results Standard Deviation
  • 20. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 15 TRW has very good performances even on potentially unknown attack sessions formed by new attack strings never seen before. Experiment 2: Metrics Results Dataset 2: all “new” attacking sessions captured in the last months of November and December 2017. 125 182 total interactions: equally divided in 62 591 new malicious and 62 591 legal logs. How does the Threshold Random Walk perform in case of “unknown” attacking sessions? How does the algorithm behave in terms of number of commands necessary to carry out the detection?
  • 21. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 16 Experiment 2: Detection Performances Threshold Random W a l k d e t e c t s a malicious series of commands in ~ 6,44 events on average with a maximum of 9 commands required.
  • 22. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 17 Experiment 3: Detection vs. Execution Average Length at Detection Dataset 3: all “complete” attacking sessions formed by series of commands that would actually infect a device. 114 226 logs = ~34.305% of 332 970 total interactions Each interaction has the characteristic of having at least one command to sample execution.
  • 23. IoT Honeypots: State of the ArtIoT Malware detection through Threshold Random Walks 18 Conclusions & Future Works Conclusions: experiments proved that Threshold Random Walk outcomes promising results. It’s: • Fast: detection of malicious interactions id performed in early stages of attacking sessions; • Lightweight: no particular computing requirements; • Extensible: upgradeable knowledge base allows to include emerging new attack techniques; • Efficient: TRW makes the correct decision on quite all observed malicious sequences of commands. Future Works: • SSH/Telnet Emulation: create a Telnet/SSH traffic sampling system on a real communication channel. • Automation of KB Creation: design an automated process that integrates into the existing KB new discovered attack strings, without necessarily having to start its creation from scratch. • Architecture Improvement: new honeypot solution could be integrated in the existing architecture. • ELK Framework: ElasticSearch, LogStash and Kibana Data Analytics tool could be integrated into the DIAG VM server to have a visual report of collected data in structured file formats (.json files).
  • 24. “A secure system is one that does what is supposed to do, and nothing more”. J.B. Ippolito, Native Intelligence, Inc. Any Question?
  • 25. Biagio Botticelli - [email protected] M.Sc. in Engineering in Computer Science Thank You! “A secure system is one that does what is supposed to do, and nothing more”. J.B. Ippolito, Native Intelligence, Inc. Any Question?