Show simple item record

AuthorNiu, Weina
AuthorXiao, Jian'An
AuthorZhang, Xiyue
AuthorZhang, Xiaosong
AuthorDu, Xiaojiang
AuthorHuang, Xiaoming
AuthorGuizani, Mohsen
Available date2022-10-31T07:40:44Z
Publication Date2021-06-15
Publication NameIEEE Internet of Things Journal
Identifierhttp://dx.doi.org/10.1109/JIOT.2020.3029970
CitationNiu, W., Zhang, X., Zhang, X., Du, X., Huang, X., & Guizani, M. (2020). Malware on Internet of UAVs detection combining string matching and fourier transformation. IEEE Internet of Things Journal, 8(12), 9905-9919.‏
URIhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85107462727&origin=inward
URIhttp://hdl.handle.net/10576/35621
AbstractAdvanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things (IoT) devices often do not focus on security, leading APT to extend to IoT, such as the Internet of emerging unmanned aerial vehicles (UAVs). Whether malware with attack payload can be successfully implanted into UAVs or not is the key to APT on the Internet of UAVs. APT malware on UAVs establishes communication with the command and control (CC) server to achieve remote control for UAVs-aware information stealing. Existing effective methods detect malware by analyzing malicious behaviors generated during CC communication. However, APT malware usually adopts a low-traffic attack mode, a large amount of normal traffic is mixed in each attack step, to avoid virus checking and killing. Therefore, it is difficult for traditional malware detection methods to discover APT malware on UAVs that carry weak abnormal signals. Fortunately, we found that most APT attacks use domain name system (DNS) to locate CC server of malware for information transmission periodically. This behavior will leave some records in the network flow and DNS logs, which provides us with an opportunity to identify infected internal UAVs and external malicious domain names. This article proposes an APT malware on the Internet of UAVs detection method combining string matching and Fourier transformation based on DNS traffic, which is able to handle encrypted and obfuscated traffic due to packet payloads independence. We preprocessed the collected network traffic by converting DNS timestamps of DNS request to strings and used the trained random forest model to discover APT malware domain names based on features extracted through string-matching-based periodicity detection and Fourier transformation-based periodicity detection. The proposed method has been evaluated on the data set, including part of normal domains from the normal traffic and malicious domains marked by security experts from APT malware traffic. Experimental results have shown that our proposed detection method can achieve the accuracy of 94%, which is better than the periodicity detection algorithm alone. Moreover, the proposed method does not need to set the confidence to filter the periodicity with high confidence.
SponsorManuscript received March 12, 2020; revised July 15, 2020 and August 27, 2020; accepted September 28, 2020. Date of publication October 12, 2020; date of current version June 7, 2021. This work was supported in part by the National Key Research and Development Plan under Grant 2016QY04W0800; in part by the National Natural Science Foundation of China under Grant 61902262 and Grant U19A2066; and in part by the National Defense Innovation Special Zone Program of Science and Technology under Grant JG2019055. (Corresponding author: Xiaosong Zhang.) Weina Niu, Jian’an Xiao, and Xiyue Zhang are with the School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China (e-mail: vinusniu@gmail.com; 18582851996@163.com; xiyue1214@hotmail.com).
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
SubjectAdvanced persistent threat (APT)
Fourier transformation
malware
periodicity detection
string matching
unmanned aerial vehicles (UAVs)
TitleMalware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
TypeArticle
Pagination9905-9919
Issue Number12
Volume Number8


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record