Iot botnet detection using system call graphs and one-class CNN classification

12Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid development of IoT devices, security risks become clearer in smart houses with the emergence of more types of IoT Botnet. With the development of machine learning technology applied to dynamic analysis methods, the automatic detection of variations of IoT Botnet has many achievements. However, there are still some difficulties such as building Sandbox suitable for IoT Botnet with specific chip architectures, collecting full of malicious behavior, imbalance in dataset,… affecting the accuracy of the learning model. In this paper, the authors introduce method of detecting IoT Botnet through system call of executable file to address some difficulties mentioned above. We edit sandbox environment based on QEMU to collect more monitoring data and focus to system calls behavior of malware. By using the CNN network architecture combined with One-class classification and features extracted from the system call graph, the authors have built a IoT Botnet detection model with an accuracy of up to 97% and F-measure 98.33%.

Cite

CITATION STYLE

APA

Le, H. V., Ngo, Q. D., & Le, V. H. (2019). Iot botnet detection using system call graphs and one-class CNN classification. International Journal of Innovative Technology and Exploring Engineering, 8(10), 937–942. https://doi.org/10.35940/ijitee.J9091.0881019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free