With the rapid development of IoT devices, security risks become clearer in smart houses with the emergence of more types of IoT Botnet. With the development of machine learning technology applied to dynamic analysis methods, the automatic detection of variations of IoT Botnet has many achievements. However, there are still some difficulties such as building Sandbox suitable for IoT Botnet with specific chip architectures, collecting full of malicious behavior, imbalance in dataset,… affecting the accuracy of the learning model. In this paper, the authors introduce method of detecting IoT Botnet through system call of executable file to address some difficulties mentioned above. We edit sandbox environment based on QEMU to collect more monitoring data and focus to system calls behavior of malware. By using the CNN network architecture combined with One-class classification and features extracted from the system call graph, the authors have built a IoT Botnet detection model with an accuracy of up to 97% and F-measure 98.33%.
CITATION STYLE
Le, H. V., Ngo, Q. D., & Le, V. H. (2019). Iot botnet detection using system call graphs and one-class CNN classification. International Journal of Innovative Technology and Exploring Engineering, 8(10), 937–942. https://doi.org/10.35940/ijitee.J9091.0881019
Mendeley helps you to discover research relevant for your work.