TY - JOUR
T1 - Improving IoT Botnet Investigation Using an Adaptive Network Layer
AU - Ceron, João Marcelo
AU - Steding-Jessen, Klaus
AU - Hoepers, Cristine
AU - Granville, Lisandro Zambenedetti
AU - Margi, Cíntia Borges
PY - 2019/2
Y1 - 2019/2
N2 - IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.
AB - IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.
KW - Botnet
KW - IoT
KW - Malware
KW - Malware analysis
KW - SDN
UR - https://www.scopus.com/pages/publications/85061493266
U2 - 10.3390/s19030727
DO - 10.3390/s19030727
M3 - Article
C2 - 30754667
AN - SCOPUS:85061493266
SN - 1424-8220
VL - 19
JO - Sensors (Switzerland)
JF - Sensors (Switzerland)
IS - 3
M1 - 727
ER -