SlideShare a Scribd company logo
Classifying IoT malware delivery patterns for attack detection
Master of Science in Engineering in Computer Science
Candidate:
Fabrizio Farinacci
Student ID: 1530961
Thesis advisor:
Prof. Leonardo Querzoni
Co-Advisor:
Dr. Giuseppe Laurenza
A. Y. 2016 - 2017
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Background: The Internet of Things
• The Internet of Things (IoT) is that vision in which anything
from vehicles to home appliances are equipped with Internet
connectivity and digitally connected for exchanging data.
• Sadly, the IoT came recently under the spotlight more for its
widespread security issues rather than its enormous potential.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Background: Threats affecting the IoT
• Being the IoT panorama formed by unsecure, misconfigured and
easily accessible devices, makes it the cybercriminals Holy Grail!
• This environment favored the proliferation of IoT malware and in
particular botnets, mainly devoted to perform DDoS attacks.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Problem statement and thesis objective
Problem
The highly vulnerable IoT landscape favors the proliferation of threats
and in particular malware. Understanding and characterizing them is
a fundamental requirement for preventing IoT devices compromise.
Thesis objective
Design a platform, trained on top of knowledge extracted from real
attacks collected by the platform itself, capable of recognizing known
attacks and detecting variants or completely new attacks.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Related work
Works in the IoT security field divides into:
• Studies providing basic security guidelines for preventing,
mitigating and recovery from attacks.
[Angrishi et al., 2017]
• Proposing honeypot systems designed for the IoT environment,
with the goal of assessing the current threats.
[SIPHON, Guarnizo et al., 2017]
• Designing detection strategies, employing either simple device
white-listing mechanism or unreliable signature-based approaches.
[Meidan et al., 2017]
• Proposing proof-of-concept mechanism for detecting infected
devices and automatize the recovery strategy.
[AntibIoTic, De Donno et al., 2017]
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Contributions
The contributions made by this work are the following:
1. Showing the honeypots capabilities of revealing IoT threats;
2. Identifying specific attack patterns for characterizing the attacks;
3. Introducing an approach for profiling the attacks;
4. Showing how profiles enable to group similar attacks;
5. Showing how profiles enable to classify and recognize attacks;
6. Showing how profiles enable to track the evolution of attacks.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Approach overview
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Attack profile extraction
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Attack patterns
Definition
Attack patterns are sequence of operations having a precise, but often
hidden and sneaky goal meaningful for the attacker.
Example
# Mirai
/bin/busybox cp /bin/echo dvrHelper; >dvrHelper; ...
...
/bin/busybox cp dvrHelper upnp; > upnp; ...
echo -ne "some HEX string" > upnp; /bin/busybox ECCHI
./upnp; ./dvrHelper telnet.mips; /bin/busybox IHCCE
# Hajime
cd /var; cat .s || cp /bin/echo .s; /bin/busybox ECCHI ...
...
>.s; cp .s .i; echo -ne "some HEX string" > .s; /bin/busybox ECCHI
./.s>.i; ./.i; rm .s; exit
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Pattern-based attack representation
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Phase 4: Attack aggregation and classification
• Once the attack profiles are extracted, they can be employed for:
◦ Grouping the attacks for devising attack classes and their evolution.
◦ Classifying the attacks and being so able to recognize them.
• For the grouping task, we employed the unsupervised learning
clustering algorithms BIRCH and DBSCAN.
• For the classification task, we trained and evaluated the supervised
learning classifiers Random Forest, Decision Tree, Bernoulli Naive
Bayes and Linear Kernel SVM.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Dataset description and testing methodology
Dataset: 270.000 attacks collected by the platform and divided
in 17 classes, representing either variants or different attacks.
Used metrics:
• Attack grouping: Homogeneity and completeness scores,
Fowlkes–Mallows index and silhouette coefficient.
• Attack classification: F1 and accuracy scores, precision and recall.
Performed tests:
• Attack grouping:
◦ Clustering comparison on 50.000 samples ( 1/5 of dataset).
◦ Incremental time-based k-fold cross-validation (k = 10).
• Attack classification:
◦ Incremental time-based k-fold cross-validation (k = 10).
◦ Stratified k-fold cross-validation (k = 5).
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Test 1: BIRCH and DBSCAN comparison
0,8
0,85
0,9
0,95
1
FMI Homogeneity Completeness
Clustering	comparison	- Observed	metrics
DBSCAN BIRCH
(a) Observed metrics comparison
0
2
4
6
8
10
Avg.	Time	(sec.)
Clustering	comparison	- Time	performance
DBSCAN BIRCH
(b) Time performance comparison
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Test 2: Incremental time-based k-fold grouping
0
0,2
0,4
0,6
0,8
1
1 2 3 4 5 6 7 8 9 10
Folds	(Time)
BIRCH	Online	- Periodical	tuning
FMI Homogeneity	score Completeness	score Silhouette	coeff.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Test 3: Incremental time-based k-fold classification
0
0,2
0,4
0,6
0,8
1
1 2 3 4 5 6 7 8 9
Folds	(Time)
Random	Forest	- Incremental	k-fold
F1	score Precision Recall Accuracy	score
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Test 4: Stratified k-fold classification
0,995
0,996
0,997
0,998
0,999
1
Random	
Forest
Decision	
Tree
Bernoulli	
Naive	
Bayes
Linear	
Kernel	
SVM
F1	score
(c) F1 score
0,995
0,996
0,997
0,998
0,999
1
Random	
Forest
Decision	
Tree
Bernoulli	
Naive	
Bayes
Linear	
Kernel	
SVM
Precision
(d) Precision
0,995
0,996
0,997
0,998
0,999
1
Random	
Forest
Decision	
Tree
Bernoulli	
Naive	
Bayes
Linear	
Kernel	
SVM
Recall
(e) Recall
0,995
0,996
0,997
0,998
0,999
1
Random	
Forest
Decision	
Tree
Bernoulli	
Naive	
Bayes
Linear	
Kernel	
SVM
Accuracy	score
(f) Accuracy score
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
Conclusions and future work
Conclusions
Results shown that our approach delivers promising results in the field
of attack recognition, enabling to study the evolution of attacks,
for at least for the subset of attacks that we managed to collect.
Future work
• Extending the platform, by:
1. Improving the honeypot platform;
2. Building a platform for organizing the data;
3. Developing Visual Analytics tools.
• Improving the description of attacks, by:
1. Improving the attack pattern identification;
2. Integrating with signature-based information.
• Online monitoring for attack prevention, by designing an online
detection procedure capable of detecting ongoing attacks.
Classifying IoT malware delivery patterns for attack detection
Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work
That’s all!
Thanks for the attention!
Any questions?
Classifying IoT malware delivery patterns for attack detection

More Related Content

What's hot

Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
IRJET Journal
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
AM Publications
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET Journal
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
Full Stack Developer at Electro Mizan Andisheh
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
Acad
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data miningbalbeerrawat
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
ijcsit
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
amiable_indian
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
vinaykumar R
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detectionbutest
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
amiable_indian
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
Editor IJCATR
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
Pritesh Ranjan
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
anilinvns
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
IJECEIAES
 

What's hot (20)

Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
IRJET- Review on Intrusion Detection System using Recurrent Neural Network wi...
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Intrusion detection using data mining
Intrusion detection using data miningIntrusion detection using data mining
Intrusion detection using data mining
 
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
IDS - Fact, Challenges and Future
IDS - Fact, Challenges and FutureIDS - Fact, Challenges and Future
IDS - Fact, Challenges and Future
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
DM for IDS
DM for IDSDM for IDS
DM for IDS
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
 

Similar to Classifying IoT malware delivery patterns for attack detection

An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
Sandeep Maurya
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
ijfls
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
ijfls
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
robust malware detection for iot devices using deep eigen space learning
robust malware detection for iot devices using deep eigen space learningrobust malware detection for iot devices using deep eigen space learning
robust malware detection for iot devices using deep eigen space learning
Venkat Projects
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
SecureIoT H2020 funded project
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutionsguest609a5ed
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
Hannan Ahmed
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
Asif Anik
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IJNSA Journal
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
ajagbesundayadeola
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
IRJET Journal
 
A survey on RBF Neural Network for Intrusion Detection System
A survey on RBF Neural Network for Intrusion Detection SystemA survey on RBF Neural Network for Intrusion Detection System
A survey on RBF Neural Network for Intrusion Detection System
IJERA Editor
 
Paper-1 PPT.pptx
Paper-1 PPT.pptxPaper-1 PPT.pptx
Paper-1 PPT.pptx
Sangeeta Mehta
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
Deris Stiawan
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
arjunchithanoor
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
ijwmn
 

Similar to Classifying IoT malware delivery patterns for attack detection (20)

An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
 
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsDDoS Attack Detection on Internet o Things using Unsupervised Algorithms
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
robust malware detection for iot devices using deep eigen space learning
robust malware detection for iot devices using deep eigen space learningrobust malware detection for iot devices using deep eigen space learning
robust malware detection for iot devices using deep eigen space learning
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster ProjectsRisk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
A survey on RBF Neural Network for Intrusion Detection System
A survey on RBF Neural Network for Intrusion Detection SystemA survey on RBF Neural Network for Intrusion Detection System
A survey on RBF Neural Network for Intrusion Detection System
 
Paper-1 PPT.pptx
Paper-1 PPT.pptxPaper-1 PPT.pptx
Paper-1 PPT.pptx
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 

Recently uploaded

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

Classifying IoT malware delivery patterns for attack detection

  • 1. Classifying IoT malware delivery patterns for attack detection Master of Science in Engineering in Computer Science Candidate: Fabrizio Farinacci Student ID: 1530961 Thesis advisor: Prof. Leonardo Querzoni Co-Advisor: Dr. Giuseppe Laurenza A. Y. 2016 - 2017
  • 2. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Background: The Internet of Things • The Internet of Things (IoT) is that vision in which anything from vehicles to home appliances are equipped with Internet connectivity and digitally connected for exchanging data. • Sadly, the IoT came recently under the spotlight more for its widespread security issues rather than its enormous potential. Classifying IoT malware delivery patterns for attack detection
  • 3. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Background: Threats affecting the IoT • Being the IoT panorama formed by unsecure, misconfigured and easily accessible devices, makes it the cybercriminals Holy Grail! • This environment favored the proliferation of IoT malware and in particular botnets, mainly devoted to perform DDoS attacks. Classifying IoT malware delivery patterns for attack detection
  • 4. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Problem statement and thesis objective Problem The highly vulnerable IoT landscape favors the proliferation of threats and in particular malware. Understanding and characterizing them is a fundamental requirement for preventing IoT devices compromise. Thesis objective Design a platform, trained on top of knowledge extracted from real attacks collected by the platform itself, capable of recognizing known attacks and detecting variants or completely new attacks. Classifying IoT malware delivery patterns for attack detection
  • 5. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Related work Works in the IoT security field divides into: • Studies providing basic security guidelines for preventing, mitigating and recovery from attacks. [Angrishi et al., 2017] • Proposing honeypot systems designed for the IoT environment, with the goal of assessing the current threats. [SIPHON, Guarnizo et al., 2017] • Designing detection strategies, employing either simple device white-listing mechanism or unreliable signature-based approaches. [Meidan et al., 2017] • Proposing proof-of-concept mechanism for detecting infected devices and automatize the recovery strategy. [AntibIoTic, De Donno et al., 2017] Classifying IoT malware delivery patterns for attack detection
  • 6. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Contributions The contributions made by this work are the following: 1. Showing the honeypots capabilities of revealing IoT threats; 2. Identifying specific attack patterns for characterizing the attacks; 3. Introducing an approach for profiling the attacks; 4. Showing how profiles enable to group similar attacks; 5. Showing how profiles enable to classify and recognize attacks; 6. Showing how profiles enable to track the evolution of attacks. Classifying IoT malware delivery patterns for attack detection
  • 7. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Approach overview Classifying IoT malware delivery patterns for attack detection
  • 8. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Attack profile extraction Classifying IoT malware delivery patterns for attack detection
  • 9. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Attack patterns Definition Attack patterns are sequence of operations having a precise, but often hidden and sneaky goal meaningful for the attacker. Example # Mirai /bin/busybox cp /bin/echo dvrHelper; >dvrHelper; ... ... /bin/busybox cp dvrHelper upnp; > upnp; ... echo -ne "some HEX string" > upnp; /bin/busybox ECCHI ./upnp; ./dvrHelper telnet.mips; /bin/busybox IHCCE # Hajime cd /var; cat .s || cp /bin/echo .s; /bin/busybox ECCHI ... ... >.s; cp .s .i; echo -ne "some HEX string" > .s; /bin/busybox ECCHI ./.s>.i; ./.i; rm .s; exit Classifying IoT malware delivery patterns for attack detection
  • 10. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Pattern-based attack representation Classifying IoT malware delivery patterns for attack detection
  • 11. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Phase 4: Attack aggregation and classification • Once the attack profiles are extracted, they can be employed for: ◦ Grouping the attacks for devising attack classes and their evolution. ◦ Classifying the attacks and being so able to recognize them. • For the grouping task, we employed the unsupervised learning clustering algorithms BIRCH and DBSCAN. • For the classification task, we trained and evaluated the supervised learning classifiers Random Forest, Decision Tree, Bernoulli Naive Bayes and Linear Kernel SVM. Classifying IoT malware delivery patterns for attack detection
  • 12. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Dataset description and testing methodology Dataset: 270.000 attacks collected by the platform and divided in 17 classes, representing either variants or different attacks. Used metrics: • Attack grouping: Homogeneity and completeness scores, Fowlkes–Mallows index and silhouette coefficient. • Attack classification: F1 and accuracy scores, precision and recall. Performed tests: • Attack grouping: ◦ Clustering comparison on 50.000 samples ( 1/5 of dataset). ◦ Incremental time-based k-fold cross-validation (k = 10). • Attack classification: ◦ Incremental time-based k-fold cross-validation (k = 10). ◦ Stratified k-fold cross-validation (k = 5). Classifying IoT malware delivery patterns for attack detection
  • 13. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Test 1: BIRCH and DBSCAN comparison 0,8 0,85 0,9 0,95 1 FMI Homogeneity Completeness Clustering comparison - Observed metrics DBSCAN BIRCH (a) Observed metrics comparison 0 2 4 6 8 10 Avg. Time (sec.) Clustering comparison - Time performance DBSCAN BIRCH (b) Time performance comparison Classifying IoT malware delivery patterns for attack detection
  • 14. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Test 2: Incremental time-based k-fold grouping 0 0,2 0,4 0,6 0,8 1 1 2 3 4 5 6 7 8 9 10 Folds (Time) BIRCH Online - Periodical tuning FMI Homogeneity score Completeness score Silhouette coeff. Classifying IoT malware delivery patterns for attack detection
  • 15. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Test 3: Incremental time-based k-fold classification 0 0,2 0,4 0,6 0,8 1 1 2 3 4 5 6 7 8 9 Folds (Time) Random Forest - Incremental k-fold F1 score Precision Recall Accuracy score Classifying IoT malware delivery patterns for attack detection
  • 16. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Test 4: Stratified k-fold classification 0,995 0,996 0,997 0,998 0,999 1 Random Forest Decision Tree Bernoulli Naive Bayes Linear Kernel SVM F1 score (c) F1 score 0,995 0,996 0,997 0,998 0,999 1 Random Forest Decision Tree Bernoulli Naive Bayes Linear Kernel SVM Precision (d) Precision 0,995 0,996 0,997 0,998 0,999 1 Random Forest Decision Tree Bernoulli Naive Bayes Linear Kernel SVM Recall (e) Recall 0,995 0,996 0,997 0,998 0,999 1 Random Forest Decision Tree Bernoulli Naive Bayes Linear Kernel SVM Accuracy score (f) Accuracy score Classifying IoT malware delivery patterns for attack detection
  • 17. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work Conclusions and future work Conclusions Results shown that our approach delivers promising results in the field of attack recognition, enabling to study the evolution of attacks, for at least for the subset of attacks that we managed to collect. Future work • Extending the platform, by: 1. Improving the honeypot platform; 2. Building a platform for organizing the data; 3. Developing Visual Analytics tools. • Improving the description of attacks, by: 1. Improving the attack pattern identification; 2. Integrating with signature-based information. • Online monitoring for attack prevention, by designing an online detection procedure capable of detecting ongoing attacks. Classifying IoT malware delivery patterns for attack detection
  • 18. Introduction Related work and contributions Proposed approach Results evaluation Conclusions and future work That’s all! Thanks for the attention! Any questions? Classifying IoT malware delivery patterns for attack detection