Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate resource-constrained devices within a botnet or leak sensitive information. A major research effort is then devoted to create countermeasures for mitigating attacks, for instance, hardware-level verification mechanisms or effective network intrusion detection frameworks. Unfortunately, advanced malware is often endowed with the ability of cloaking communications within network traffic, e.g., to orchestrate compromised IoT nodes or exfiltrate data without being noticed. Therefore, this paper showcases how different autoencoder-based architectures can spot the presence of malicious communications hidden in conversations, especially in the TTL of IPv4 traffic. To conduct tests, this work considers IoT traffic traces gathered in a real setting and the presence of an attacker deploying two hiding schemes (i.e., naive and “elusive” approaches). Collected results showcase the effectiveness of our method as well as the feasibility of deploying autoencoders in production-quality IoT settings.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Cassavia, N., Caviglione, L., Guarascio, M., Liguori, A., & Zuppelli, M. (2024). Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems. Journal of Intelligent Information Systems, 62(4), 925–949. https://doi.org/10.1007/s10844-023-00819-8