Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
المؤلف | Niu, Weina |
المؤلف | Xiao, Jian'An |
المؤلف | Zhang, Xiyue |
المؤلف | Zhang, Xiaosong |
المؤلف | Du, Xiaojiang |
المؤلف | Huang, Xiaoming |
المؤلف | Guizani, Mohsen |
تاريخ الإتاحة | 2022-10-31T07:40:44Z |
تاريخ النشر | 2021-06-15 |
اسم المنشور | IEEE Internet of Things Journal |
المعرّف | http://dx.doi.org/10.1109/JIOT.2020.3029970 |
الاقتباس | Niu, W., Zhang, X., Zhang, X., Du, X., Huang, X., & Guizani, M. (2020). Malware on Internet of UAVs detection combining string matching and fourier transformation. IEEE Internet of Things Journal, 8(12), 9905-9919. |
الملخص | Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things (IoT) devices often do not focus on security, leading APT to extend to IoT, such as the Internet of emerging unmanned aerial vehicles (UAVs). Whether malware with attack payload can be successfully implanted into UAVs or not is the key to APT on the Internet of UAVs. APT malware on UAVs establishes communication with the command and control (CC) server to achieve remote control for UAVs-aware information stealing. Existing effective methods detect malware by analyzing malicious behaviors generated during CC communication. However, APT malware usually adopts a low-traffic attack mode, a large amount of normal traffic is mixed in each attack step, to avoid virus checking and killing. Therefore, it is difficult for traditional malware detection methods to discover APT malware on UAVs that carry weak abnormal signals. Fortunately, we found that most APT attacks use domain name system (DNS) to locate CC server of malware for information transmission periodically. This behavior will leave some records in the network flow and DNS logs, which provides us with an opportunity to identify infected internal UAVs and external malicious domain names. This article proposes an APT malware on the Internet of UAVs detection method combining string matching and Fourier transformation based on DNS traffic, which is able to handle encrypted and obfuscated traffic due to packet payloads independence. We preprocessed the collected network traffic by converting DNS timestamps of DNS request to strings and used the trained random forest model to discover APT malware domain names based on features extracted through string-matching-based periodicity detection and Fourier transformation-based periodicity detection. The proposed method has been evaluated on the data set, including part of normal domains from the normal traffic and malicious domains marked by security experts from APT malware traffic. Experimental results have shown that our proposed detection method can achieve the accuracy of 94%, which is better than the periodicity detection algorithm alone. Moreover, the proposed method does not need to set the confidence to filter the periodicity with high confidence. |
راعي المشروع | Manuscript received March 12, 2020; revised July 15, 2020 and August 27, 2020; accepted September 28, 2020. Date of publication October 12, 2020; date of current version June 7, 2021. This work was supported in part by the National Key Research and Development Plan under Grant 2016QY04W0800; in part by the National Natural Science Foundation of China under Grant 61902262 and Grant U19A2066; and in part by the National Defense Innovation Special Zone Program of Science and Technology under Grant JG2019055. (Corresponding author: Xiaosong Zhang.) Weina Niu, Jian’an Xiao, and Xiyue Zhang are with the School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China (e-mail: vinusniu@gmail.com; 18582851996@163.com; xiyue1214@hotmail.com). |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Advanced persistent threat (APT) Fourier transformation malware periodicity detection string matching unmanned aerial vehicles (UAVs) |
النوع | Article |
الصفحات | 9905-9919 |
رقم العدد | 12 |
رقم المجلد | 8 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2426 items ]