عرض بسيط للتسجيلة

المؤلفNiu, Weina
المؤلفXiao, Jian'An
المؤلفZhang, Xiyue
المؤلفZhang, Xiaosong
المؤلفDu, Xiaojiang
المؤلفHuang, Xiaoming
المؤلفGuizani, Mohsen
تاريخ الإتاحة2022-10-31T07:40:44Z
تاريخ النشر2021-06-15
اسم المنشورIEEE Internet of Things Journal
المعرّفhttp://dx.doi.org/10.1109/JIOT.2020.3029970
الاقتباسNiu, W., Zhang, X., Zhang, X., Du, X., Huang, X., & Guizani, M. (2020). Malware on Internet of UAVs detection combining string matching and fourier transformation. IEEE Internet of Things Journal, 8(12), 9905-9919.‏
معرّف المصادر الموحدhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85107462727&origin=inward
معرّف المصادر الموحدhttp://hdl.handle.net/10576/35621
الملخصAdvanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things (IoT) devices often do not focus on security, leading APT to extend to IoT, such as the Internet of emerging unmanned aerial vehicles (UAVs). Whether malware with attack payload can be successfully implanted into UAVs or not is the key to APT on the Internet of UAVs. APT malware on UAVs establishes communication with the command and control (CC) server to achieve remote control for UAVs-aware information stealing. Existing effective methods detect malware by analyzing malicious behaviors generated during CC communication. However, APT malware usually adopts a low-traffic attack mode, a large amount of normal traffic is mixed in each attack step, to avoid virus checking and killing. Therefore, it is difficult for traditional malware detection methods to discover APT malware on UAVs that carry weak abnormal signals. Fortunately, we found that most APT attacks use domain name system (DNS) to locate CC server of malware for information transmission periodically. This behavior will leave some records in the network flow and DNS logs, which provides us with an opportunity to identify infected internal UAVs and external malicious domain names. This article proposes an APT malware on the Internet of UAVs detection method combining string matching and Fourier transformation based on DNS traffic, which is able to handle encrypted and obfuscated traffic due to packet payloads independence. We preprocessed the collected network traffic by converting DNS timestamps of DNS request to strings and used the trained random forest model to discover APT malware domain names based on features extracted through string-matching-based periodicity detection and Fourier transformation-based periodicity detection. The proposed method has been evaluated on the data set, including part of normal domains from the normal traffic and malicious domains marked by security experts from APT malware traffic. Experimental results have shown that our proposed detection method can achieve the accuracy of 94%, which is better than the periodicity detection algorithm alone. Moreover, the proposed method does not need to set the confidence to filter the periodicity with high confidence.
راعي المشروعManuscript received March 12, 2020; revised July 15, 2020 and August 27, 2020; accepted September 28, 2020. Date of publication October 12, 2020; date of current version June 7, 2021. This work was supported in part by the National Key Research and Development Plan under Grant 2016QY04W0800; in part by the National Natural Science Foundation of China under Grant 61902262 and Grant U19A2066; and in part by the National Defense Innovation Special Zone Program of Science and Technology under Grant JG2019055. (Corresponding author: Xiaosong Zhang.) Weina Niu, Jian’an Xiao, and Xiyue Zhang are with the School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, Chengdu 611731, China (e-mail: vinusniu@gmail.com; 18582851996@163.com; xiyue1214@hotmail.com).
اللغةen
الناشرInstitute of Electrical and Electronics Engineers Inc.
الموضوعAdvanced persistent threat (APT)
Fourier transformation
malware
periodicity detection
string matching
unmanned aerial vehicles (UAVs)
العنوانMalware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
النوعArticle
الصفحات9905-9919
رقم العدد12
رقم المجلد8


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة