Cargando…

IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices

Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets...

Descripción completa

Detalles Bibliográficos
Autores principales: Bezerra, Vitor Hugo, da Costa, Victor Guilherme Turrisi, Barbon Junior, Sylvio, Miani, Rodrigo Sanches, Zarpelão, Bruno Bogaz
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679338/
https://www.ncbi.nlm.nih.gov/pubmed/31331071
http://dx.doi.org/10.3390/s19143188
_version_ 1783441315791372288
author Bezerra, Vitor Hugo
da Costa, Victor Guilherme Turrisi
Barbon Junior, Sylvio
Miani, Rodrigo Sanches
Zarpelão, Bruno Bogaz
author_facet Bezerra, Vitor Hugo
da Costa, Victor Guilherme Turrisi
Barbon Junior, Sylvio
Miani, Rodrigo Sanches
Zarpelão, Bruno Bogaz
author_sort Bezerra, Vitor Hugo
collection PubMed
description Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device’s behaviour, the approach extracts features from the device’s CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device’s energy consumption, and CPU and memory utilisation.
format Online
Article
Text
id pubmed-6679338
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66793382019-08-19 IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices Bezerra, Vitor Hugo da Costa, Victor Guilherme Turrisi Barbon Junior, Sylvio Miani, Rodrigo Sanches Zarpelão, Bruno Bogaz Sensors (Basel) Article Internet of Things (IoT) devices have become increasingly widespread. Despite their potential of improving multiple application domains, these devices have poor security, which can be explored by attackers to build large-scale botnets. In this work, we propose a host-based approach to detect botnets in IoT devices, named IoTDS (Internet of Things Detection System). It relies on one-class classifiers, which model only the legitimate device behaviour for further detection of deviations, avoiding the manual labelling process. The proposed solution is underpinned by a novel agent-manager architecture based on HTTPS, which prevents the IoT device from being overloaded by the training activities. To analyse the device’s behaviour, the approach extracts features from the device’s CPU utilisation and temperature, memory consumption, and number of running tasks, meaning that it does not make use of network traffic data. To test our approach, we used an experimental IoT setup containing a device compromised by bot malware. Multiple scenarios were made, including three different IoT device profiles and seven botnets. Four one-class algorithms (Elliptic Envelope, Isolation Forest, Local Outlier Factor, and One-class Support Vector Machine) were evaluated. The results show the proposed system has a good predictive performance for different botnets, achieving a mean F1-score of 94% for the best performing algorithm, the Local Outlier Factor. The system also presented a low impact on the device’s energy consumption, and CPU and memory utilisation. MDPI 2019-07-19 /pmc/articles/PMC6679338/ /pubmed/31331071 http://dx.doi.org/10.3390/s19143188 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Bezerra, Vitor Hugo
da Costa, Victor Guilherme Turrisi
Barbon Junior, Sylvio
Miani, Rodrigo Sanches
Zarpelão, Bruno Bogaz
IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title_full IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title_fullStr IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title_full_unstemmed IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title_short IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
title_sort iotds: a one-class classification approach to detect botnets in internet of things devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679338/
https://www.ncbi.nlm.nih.gov/pubmed/31331071
http://dx.doi.org/10.3390/s19143188
work_keys_str_mv AT bezerravitorhugo iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices
AT dacostavictorguilhermeturrisi iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices
AT barbonjuniorsylvio iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices
AT mianirodrigosanches iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices
AT zarpelaobrunobogaz iotdsaoneclassclassificationapproachtodetectbotnetsininternetofthingsdevices