Cargando…
IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679338/ https://www.ncbi.nlm.nih.gov/pubmed/31331071 http://dx.doi.org/10.3390/s19143188 |
_version_ | 1783441315791372288 |
---|---|
author | Bezerra, Vitor Hugo da Costa, Victor Guilherme Turrisi Barbon Junior, Sylvio Miani, Rodrigo Sanches Zarpelão, Bruno Bogaz |
author_facet | Bezerra, Vitor Hugo da Costa, Victor Guilherme Turrisi Barbon Junior, Sylvio Miani, Rodrigo Sanches Zarpelão, Bruno Bogaz |
author_sort | Bezerra, Vitor Hugo |
collection | PubMed |
description | Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device’s behaviour, the approach extracts features from the device’s CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device’s energy consumption, and CPU and memory utilisation. |
format | Online Article Text |
id | pubmed-6679338 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66793382019-08-19 IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices Bezerra, Vitor Hugo da Costa, Victor Guilherme Turrisi Barbon Junior, Sylvio Miani, Rodrigo Sanches Zarpelão, Bruno Bogaz Sensors (Basel) Article Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device’s behaviour, the approach extracts features from the device’s CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device’s energy consumption, and CPU and memory utilisation. MDPI 2019-07-19 /pmc/articles/PMC6679338/ /pubmed/31331071 http://dx.doi.org/10.3390/s19143188 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Bezerra, Vitor Hugo da Costa, Victor Guilherme Turrisi Barbon Junior, Sylvio Miani, Rodrigo Sanches Zarpelão, Bruno Bogaz IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title | IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title_full | IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title_fullStr | IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title_full_unstemmed | IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title_short | IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices |
title_sort | iotds: a one-class classification approach to detect botnets in internet of things devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679338/ https://www.ncbi.nlm.nih.gov/pubmed/31331071 http://dx.doi.org/10.3390/s19143188 |
work_keys_str_mv | AT bezerravitorhugo iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices AT dacostavictorguilhermeturrisi iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices AT barbonjuniorsylvio iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices AT mianirodrigosanches iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices AT zarpelaobrunobogaz iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices |