Billions of devices in the Internet of Things (IoT) are inter-connected over the internet and communicate with each other or end users. IoT devices communicate through messaging bots. These bots are important in IoT systems to automate and better manage the work flows. IoT devices are usually spread across many applications and are able to capture or generate substantial influx of big data. The integration of IoT with cloud computing to handle and manage big data, requires considerable security measures in order to prevent cyber attackers from adversarial use of such large amount of data. An attacker can simply utilize the messaging bots to perform malicious activities on a number of devices and thus bots pose serious cybersecurity hazards for IoT devices. Hence, it is important to detect the presence of malicious bots in the network. In this paper we propose an evidence theory-based approach for malicious bot detection. Evidence Theory, a.k.a. Dempster Shafer Theory (DST) is a probabilistic reasoning tool and has the unique ability to handle uncertainty, i.e. in the absence of evidence. It can be applied efficiently to identify a bot, especially when the bots have dynamic or polymorphic behavior. The key characteristic of DST is that the detection system may not need any prior information about the malicious signatures and profiles. In this work, we propose to analyze the network flow characteristics to extract key evidence for bot traces. We then quantify these pieces of evidence using apriori algorithm and apply DST to detect the presence of the bots.
[1]
Isaac Woungang,et al.
Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis
,
2017,
ISDDC.
[2]
Sanjay Ghemawat,et al.
MapReduce: Simplified Data Processing on Large Clusters
,
2004,
OSDI.
[3]
Rakesh Agarwal,et al.
Fast Algorithms for Mining Association Rules
,
1994,
VLDB 1994.
[4]
Veelasha Moonsamy,et al.
Mining permission patterns for contrasting clean and malicious android applications
,
2014,
Future Gener. Comput. Syst..
[5]
Akbar Siami Namin,et al.
Detecting Web Spams Using Evidence Theory
,
2018,
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[6]
Guofei Gu,et al.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
,
2008,
USENIX Security Symposium.
[7]
Marcelo R. Campo,et al.
Survey on network-based botnet detection methods
,
2014,
Secur. Commun. Networks.
[8]
Shouhuai Xu,et al.
A Framework for Understanding Botnets
,
2009,
2009 International Conference on Availability, Reliability and Security.
[9]
Ramakrishnan Srikant,et al.
Fast algorithms for mining association rules
,
1998,
VLDB 1998.