A method to detect Internet of Things botnets

The main security problems, typical for the Internet of Things (IoT), as well as the purpose of gaining unauthorized access to the IoT, are considered in this paper. Common characteristics of the most widespread botnets are provided. A method to detect compromised IoT devices included into a botnet is proposed. The method is based on a model of logistic regression. The article describes a developed model of logistic regression which allows to estimate the probability that a device initiating a connection is running a bot. A list of network protocols, used to gain unauthorized access to a device and to receive instructions from common and control (C&C) server, is provided too.

[1]  Emc Education Services Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data , 2015 .

[2]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[3]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[4]  Andreas Terzis,et al.  A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.

[5]  Geng Wu,et al.  M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.

[6]  Tatu Ylönen,et al.  The Secure Shell (SSH) Protocol Architecture , 2006, RFC.

[7]  Dmitry S. Silnov,et al.  The Internet of Things cybersecurity examination , 2017, 2017 Siberian Symposium on Data Science and Engineering (SSDSE).

[8]  A. O. Prokofiev,et al.  Examination of cybercriminal behaviour while interacting with the RTSP-Server , 2017, 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM).

[9]  Mathy Vanhoef Key Reinstallation Attacks : Breaking the WPA 2 Protocol , 2017 .

[10]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[11]  Florence March,et al.  2016 , 2016, Affair of the Heart.

[12]  Gustavo Gonzalez Granadillo,et al.  Botnets: Lifecycle and Taxonomy , 2011, 2011 Conference on Network and Information Systems Security.

[13]  Guofei Gu,et al.  BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.

[14]  Jon Postel,et al.  Telnet Protocol Specification , 1980, RFC.