Technical Reports
- Report Date Covered Start
2018-10-17
- Report Date Covered End
2019-10-17
- Report Submission Date
2019-10-15
- Project Implementation Countries
Malaysia
- Project Leaders
- Raihana Syahirah Abdullah
- Team Members
- Raihana Syahirah Abdullah [email protected]
- Partner Organizations
- Total Budget Approved
13000 USD
A novel graph analytics theory model to mitigate IoT botnets attacks for big data
Raihana Syahirah Abdullah
The Internet of Things (IoT) is emerging in full force and anyone could be trouble if they are not prepared to protect their networks. Everything is become internet-enables. The internet-connected with the smart devices and machines can create vulnerabilities within organization. Many IoT devices that are currently in use have lax or no security capabilities making it is easy to compromise and easy target for hackers to breach the critical information. As technology evolved, hackers building more sophisticated IoT botnets to do illicit purposes in IoT devices. Todays, hackers targeting organizations across all sectors but healthcare sectors have more at stake because their services are so central to people’s lives. In order the reliance on so many IoT devices, hacker exploit IoT devices to create powerful botnets attack and make difficulties to organizations defend against menaces. Yet, none of previous research use graph analytics theory model to mitigate the IoT botnets in organizations. Therefore, this research attempts to get the parameter from raw infection codes using a reverse engineering approach as well as addressing the real behaviours of IoT botnets. The main objective of the research is to develop a new model in detecting IoT botnets using graph analytics theory model with analysing the selection of influence feature factor. Two main steps are needed in this research. Firstly is to analyse the behaviour of IoT botnets using reverse engineering approach by distinguish the IoT botnets activities from raw infection codes. Secondly is to develop the new graph analytics theory model for detecting IoT botnets attack. The expected output of this research is a scheme that is able to remove and quarantine the suspicious codes as well as able to detect the behaviour changes in the IoT devices due to influence feature factor that is embedded inside the approach. The model also can be used for security tool community who want to get and discover the real behaviors of IoT botnets from the raw infection codes that exists in particular IoT devices and machines.
Background and Justification:[Back to table of contents]
The trending of Internet of Things (IoT) has become popularized by the industries as emerging technology that will continue to growth throughout the years. However, the technologies which dependent on continuous online environment will likely to become target for attackers. With current threat such as ransomware, botnet and other malware rampaging in our network, IoT will become difficult to approach for companies who tries to embrace it. IoT botnets has become a serious threat especially in healthcare organization that utilize IoT devices for their working environment thus, this project will be focusing on IoT botnet whether it’s behavior or attack pattern. Previous researcher tends to provide solution such as detection based on specific behavior but there is no research mentioning graph analytics theory model to mitigate IoT botnet attacks. Currently, worldwide is trending with the year of the Internet of Things (IoT) and the latest analyst forecasts indicate that growth will continue to accelerate through the year. But, in this highly connected environment, new security threats and creative forms of cyber attack are emerging to exploit any weak links. IoT botnets and ransomware are already making the headlines. The Internet of Things (IoT) promises many benefits for both consumers and business. But, without strong security, attacks similar to those that affected more than 100,000 devices could become an everyday occurrence. Mitigating the IoT botnet attacks is a particularly challenging task. Internet of things (IoT) devices, refers to inter-networking devices, which can communicate through network enabled. In IoT area, more researchers focus on the development of IoT smart devices from secure the IoT devices vulnerabilities. However, IoT devices are still in its infancy and insecure devices have continued to be a problem over the last couple of years (Victoria, 2017). Hackers are increasingly taking advantage of these vulnerabilities to add insecure IoT devices to already well functioning IoT botnets (Nickilaos, 2017). These pools of vulnerable devices have added to the capabilities of IoT botnets which have lead to stronger attacks. In addition, the large number of insecure Internet of Things (IoT) devices with high computation power make them an easy and attractive target for attackers seeking to compromise these devices and use them to create large-scale botnets (Nasser et. al., 2017). Consequently, many IoT devices lack even elementary security such as IoT devices do not have well security perimeters and continuously change due to device and user mobility (Nayeem, 2017). Furthermore, selecting a significant influence feature also important in IoT botnet detection because it depends on feature that involved (Eslahi et al., 2015). Based on statement Technology (2008), existing research focusses more on the technique of recognition rather than uncovering the purpose behind the influence feature. Moreover, most of researcher only used the feature inside the system without mentioning the influence feature in IoT botnet detection. Thus, it is necessary to reveal influence feature in IoT botnet detection using any machine learning approach. As technology evolved, hackers building more sophisticated IoT botnets to do illicit purposes in IoT devices to launch massive attacks. Todays, hackers are indiscriminate, they are targeting organizations across all sectors but healthcare sectors have more at stake because their services are so central to people’s lives. In healthcare sector, while IoT data from smart things and sensors capturing health related data can be collected and processed with the intent of improving our daily lives, communications among smart devices could also reveal private information about patients. According to Aysha (2017), the risks in IoT-based critical systems is becoming more significant, and any interruption or corruption could result in costly damage as life threatening challenges. From the previous, there are many techniques that used for protecting patient information in medical but none yet focus in the impact of IoT botnets behaviour changes at the IoMT (Internet of Medical things) devices level. This research direction is emphasizing to get the influence feature of IoMT healthcare devices and reveal the IoT botnets behaviour changes by producing one of the security optimization approach which is graph analytics theory model to detect the present of IoT botnets attacks. Significantly, the process of finding, identifying, classifying and detecting the IoT botnets will collaborate with Cyber Security Malaysia since the latest IoT botnets is distribute by them. Botnets, also known as zombie armies, are posing a huge threat to IoT security (Aviv and Haeberlen, 2011). An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes (Nickilaos, 2017). They are capable of attacking critical infrastructure and distributing malware through weak links in the chain. In a connected environment, this can result in further infected devices within the network. And, most of the time, this happens without the knowledge of the device owner. Connected medical devices are just one of the IoT categories that have proved to be vulnerable to hackers. It will take considerable work to secure these connected devices. But, until then, there are genuine concerns over the security of medical information and a significant risk compromising patient confidentiality. Botnets have the opportunity to thrive in the IoT environment because many of these connected devices do not have malware protection. Symantec claiming that the IoT devices, including the refrigerator and smart tv, were the source of the massive spam attack (Symantec, 2015). In their view, that specific spam attack was generated by a typical IoT botnets based on an infected IoT smart devices. With the proliferation of Internet applications and services, cyber criminals discovered a treasure-trove to explore and exploit by using IoT botnets and ransomware. Now, with the rise of the IoT, a new generation of malware is emerging. This research will be discussed based on the taxonomy of the project background as displayed in Figure 1.1. There are many kinds of IoT botnet such as Torii, BASHLITE, Mirai, Aidra and Hajime. IoT botnet attacks give massive impact as it cause big total lost all over the world. Moreover, based on the listed IoT botnet types, Mirai is the famous IoT botnet that attacks the users since the first attack in 2016 (Antonakakis et al., 2017). Mostly, malware activities exist in windows registry and Dynamic-link library (DLLs). Thus, the effects of the malware attacks, it is needed to consult an approach to detect a malware pattern based on their behavior in the attacked location such as windows registry, file system, and DLL. There are a several kinds of detection which are firewall, honeypot, intrusion detection system (IDS), and sandbox. This study will focus on sandbox detection analysis as detection method to detect malware in windows registry, DLLs and file system. A sandbox has three kinds of analysis which are static, dynamic and hybrid analysis. Dynamic analysis has been chosen for this research that suitable for malware behavior analysis. As IoT botnet detection approach, graph-based method has been used in this research. There are two types of graph that consist in graph-based method which are static graph and dynamic graph. This research focuses on dependency graph in dynamic graph.

Project Implementation:[Back to table of contents]
Internet of Things (IoT) is the network devices that certainly not another kind of innovation, it is the expansion of existing advancements; for example, a huge number of smart phones are associated by Wi-Fi or 3G systems, software, sensors and connectivity which allows to connect, interact and exchange data. IoT is one of the technologies that increase rapidly nowadays, and it became the target for attacker to exploit because of the lack security level in IoT devices. An IoT botnet is a gathering of hacked PCs, savvy apparatuses and Internet-associated devices that have been co-settled on illegal purposes. Botnet works by infecting internet-connected devices that come with a few vulnerabilities on that devices. From this issues, it is difficult to distinguish the characteristics of IoT botnet behavior and difficult to detect the behavior because of technology nowadays. Dependency graph approach is applied to analyze the behavior of IoT botnet and identify the pattern from similarity and dissimilarity for each malware. To complete the analysis of malware, a malware samples have being injected in Cuckoo Sandbox as a virtualized execution environment. After a graphs have been constructed, the rules extraction will be generated after analyze the similarity and dissimilarity of a graph. As a result, this approach could be used to obtain a new findings in graph-based method. IoT security must become a priority and a significant component of security perimeter in every sector now. Security optimization can help close IoT vulnerabilities. With the immense number of IoT devices and the amount of data produce, it will likely be overwhelmed trying to manually manage and track it all. However, through the leverage graph analytics theory, the analyze data and network interactions can be done by determining safe device behavior. With this level of insight into general usage patterns, it becomes easier to identify abnormal activity and block harmful actions produce by IoT botnets attack. Thus, in this research, the objective will be to identify the behavior of IoT botnet using reverse engineering approach. From the behavior of the malware, this research will attempt to formulate a novel graph analytic theory model in detecting IoT botnets activities attack. Then, the model will be validate by improving the accuracy of IoT botnets detection. The expected output of this research is a scheme that is able to remove and quarantine the suspicious codes as well as able to detect the behavior changes in the IoT devices due to influence feature factor that is embedded inside the approach. The model also can be used for security tool community who want to get and discover the real behaviors of IoT botnets from the raw infection codes that exists in particular IoT devices and machines The activity of this research is divided into five phase. The initial phase requires to study and addressing the problem that has been faced by IoT network which currently IoT botnets. Then, literature review will be focusing on IoT botnets, IoT devices and machine learning approach. The second phase which is data collection anad design requires a testbed environment setup in order to collect data of IoT botnets. These datasets that has been captured in testbed will be labelled with IoT botnets malicious traffic. The third phase is design and implementation phase which require captured dataset to be analyzed and will be compared to find distinctive behavior. Then, the new machine learning scheme with approximate scripting will be designed. In this phase, suitable influence feature factor has also been identified. The researcher will develop and run IoT botnets detection model using graph analytics theory model in phase four which is developing the new model. Lastly in testing and evaluation of result phase, the researcher tests the new graph analytics theory model with the selected influence feature factor to validate the result of detection either it was effective or not.

Specification | Details |
Processor | Intel xeon e5430/2.66 ghz quad-core 1333mhz |
Cache memory | L2 cache – 12 mb |
Storage | 4tb raid 0, raid 1 |
Memory | 32 gb fb-dimm 240-pin |
Ram | 16gb |
Networking | Ethernet, fast ethernet, gigabit ethernet |


2.2.2 Phase 2: Data Collection and Design
In this phase, it shows the logical design of the Cuckoo Sandbox environment as attach in Figure 2.5. When a file or an url is submitted to the Cuckoo Host, a new entry will be made in the database after submission of a file or URL and a task ID will be generated. For this new task, the entry contains information about what the target (the object to be analysed) is and the configured and specified analytical preferences. Cuckoo will inject the uploaded malware into analysis virtual machine. Then, it will produce a report containing the logs of the malware and its behavior.
2.2.3 Phase 3: Analysis and Implementation
This method used to detect the behavioral of IoT botnet in file system and registry location that using Cuckoo Sandbox. Figure 2.6 illustrate the flow of malware injection and generating report. Each step of the flowchart will be explained below.
Registry key | Descriptions |
HKEY_LOCAL_MACHINESoftwareMicrosoft WindowsCurrentVersionWindowsUpdate | Windows update may could be modified to close the auto update of Windows. So, there will have some vulnerable in that Windows machine. |
HKEY_LOCAL_MACHINESoftwareMicrosoft WBEMCIMOM | CIMOM registry key is normal for every svchost.exe process, but it could be malicious when there is deleted registry key of CIMOM |
HKEY_LOCAL_ MACHINESystemCurrentControlSetServicesTcpip | This registry key is the most important key for Mirai access due to the behaviour of Mirai that have been mentioned in sub-topic 5.2. |
svchost.exe | RegCreateKey | HKLMSoftwareMicrosoftWBEMCIMOM | Success |
svchost.exe | RegCloseKey | HKLM | Success |
svchost.exe | RegSetValue | HKLMSOFTWAREMicrosoftWBEMCIMOM ConfigValueEssNeedsLoading | Success |
svchost.exe | RegCloseKey | HKLMSOFTWAREMicrosoftWBEMCIMOM | Success |
svchost.exe | RegOpenKey | HKLM | Success |
svchost.exe | RegQueryKey | HKLM | Success |
svchost.exe | RegCreateKey | HKLMSoftwareMicrosoftWBEMCIMOM | Success |
API | ARGUMENTS | STATUS |
RegCreateKeyExW | Handle: 0x00000ad4 FullName: HKEY_LOCAL_MACHINESoftwareMicrosoftWBEMCIMOM Access: KEY_QUERY_VALUE|KEY_SET_VALUE Registry: 0xffffffff80000002 Disposition: REG_OPENED_EXISTING_KEY Class: SubKey: SoftwareMicrosoftWBEMCIMOM | Success |
RegSetValueExW | Handle: 0x00000ad4 Buffer: 2019/8/3 13:19:35'693 BufferLength: 44 ValueName: PreviousServiceShutdown Type: REG_SZ FullName: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOMPreviousServiceShutdown | Success |
RegDeleteValueW | Handle: 0x00000ad4 FullName: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWBEMCIMOMLastServiceStart ValueName: LastServiceStart | Success |
RegCloseKey | Handle: 0x00000ad4 | Success |





2.2.4 Phase 4: Testing and Evaluation
Under this phase, verification will be done to verify whether the attributes will generate the correct attack pattern or vice versa. In testing phase, comparison will be made between selected sample malwares. In this graph based, the research uses the directed graph method. A dependency graph (or directed) is a set of vertices and a collection of directed edges that connect a pair of vertices ordered by each. It's a pointing edge from the pair's first vertex and points to the pair's second vertex. This section will discuss the training and testing malware that have been used to get a result of graph theory approach. In this section, the registry key in process svchost.exe listed in Table 2.4, and the path indicates as their ID that will be used in the representation of graphs. Table 2.4: List of PathPath | Registry Key |
P1 | Hkey_local_machinesoftwaremicrosoftwindows ntcurrentversionschedule |
P3 | Hkey_local_machinesoftwareclasses |
P4 | Hkey_local_machinesoftwaremicrosoftwindowscurrentversion windowsupdate |
P5 | Hkey_current_usersoftwaremicrosoftwindowsCurrentversion explorershell folders |
P6 | Hkey_local_machinesoftwaremicrosoftTracingiphlpsvc |
P7 | Hkey_local_machinesystemcurrentcontrolsetServices |
P8 | Hkey_local_machinesoftwaremicrosoftrpcSecurityservice |
P9 | Hkey_local_machinesoftwaremicrosoftwbemCimom |
P11 | Hkey_local_machinesoftwaremicrosoftwbemTransportsdecoupled server |
P12 | Hkey_local_machinesystemcurrentcontrolsetServicestcpip |
P14 | Hkey_local_machinesoftwarepoliciesMicrosoftwindows windowsupdate |
P15 | Hkey_local_machinesystemcontrolset001Servicesmmcss |
P16 | Hkey_local_machinesoftwaremicrosoftWbemess |
P17 | Hkey_local_machinesystemcontrolset001Servicestcpip |
P18 | Hkey_local_machinesystemsetup |





Registry key (path) | M1 (549f1332ae169d98648bfaa0d8f1af9) | M2 (f5660b1ccad67b08f6ece03c625e469) | M3 (7a44108b25ofc4d502676o2988f7ofa) | M4 (10a3eddd2d4716375becd54b3050cf2) | M5 (ff905b3164ab0a36fa07623020d47e0) |
P1 | 1 | 2 | 1 | 2 | 1 |
P3 | 2 | 4 | 2 | 2 | 2 |
P4 | 2 | 2 | 2 | 2 | 2 |
P5 | 3 | 2 | 3 | 2 | 2 |
P6 | 1 | 0 | 0 | 2 | 1 |
P7 | 3 | 3 | 3 | 2 | 1 |
P8 | 2 | 3 | 2 | 2 | 4 |
P9 | 2 | 2 | 2 | 2 | 2 |
P11 | 1 | 1 | 1 | 1 | 1 |
P12 | 1 | 1 | 1 | 1 | 1 |
P14 | 1 | 1 | 1 | 2 | 0 |
P15 | 1 | 1 | 1 | 1 | 1 |
P16 | 0 | 1 | 1 | 1 | 1 |
No | Rules | Remarks |
1 | If p4, p9, p12 and p15 exists in svchost.exe process, then it is mirai | Infected by Mirai |
2 | If p4, p9 and p12 exists in svchost.exe process, then it is malicious | Take an action for prevention |
3 | If p4, p9 and p15 exists in svchost.exe process, then it is malicious | Take an action for prevention |
4 | If p9, p12 and p15 exists in svchost.exe process, then it is malicious | Take an action for prevention |
5 | If p4 and p9 exists in svchost.exe process, then it is malicious | Take an action for prevention |
6 | If p9 and p12 exists in svchost.exe process, then it is malicious | Take an action for prevention |
7 | If p9 and p15 exists in svchost.exe process, then it is malicious | Take an action for prevention |
Registry Key (Path) | M1 (9eb17dbb 2fb3e88ceb8537b083a5f7d) | M2 (abf2d77fab d726dc5b7811 79416e0a9) | M3 (10a3eddd2d4716375becd54b3050cf2) | M4 (dd257d9d3d642 8897730de4df3d50) | M5 (8f628545e dee75cc1613 365127590f5) |
P4 | yes | yes | yes | yes | no |
P9 | yes | yes | yes | yes | yes |
P12 | yes | yes | yes | yes | yes |
P15 | yes | yes | yes | yes | yes |
Project Evaluation:[Back to table of contents]
Currently, the research has been proceed into researching behavior of IoT botnet by doing literature review. With this literature review, the researcher can make comparative analysis using previous researcher journal and paper. With the current progress, comparative analysis with previous solution can be made for IoT community in future guide. This will help the research to have deep knowledge in behavior of IoT botnets before data collection phase. Furthermore, novel theories or new findings can be found during research which can further the progress of the research. This research also has potential to collaborate with government agencies such as Cyber Security Malaysia in designing testbed of IoT botnets attacks. During current phase, the researcher will have several insight that can help to identify behavior of IoT botnets thus, able to develop graph analytics theory model. This section discussed related studies on detection IoT Botnet in network traffic and using graph-based method. According to (Elovici et al., 2018), IoT devices is more easily to compromised than desktop computer and it increasing of IoT-based botnet attacks. A researcher proposed a new method to discover this kind of problem which is propose a novel network-based anomaly detection method for the IoT. This method can extract behavior snapshots of the network and use deep autoencoders to detect anomalous network traffic from infected IoT devices. In this research, a researcher using their own data collection of network traffic using port mirroring on the switch. They use nine IoT devices and inject IoT botnet on it. They launched the Mirai and BASHLITE attacks on their IoT device and they capture the traffic data before and after infection. The result of this method that have been analyzed and it show high True Positive Rate (TPR) is 100%. This method also raised the fewest false alarms and it demonstrated False Positive Rate (FPR) of 0.007. The advantage of this method is generating an accurate result of detection. Besides, heterogeneity tolerance addresses the growing heterogeneity of IoT devices. It also trained to detect when a behavior is abnormal can detect previously “unseen” botnet behavior. In term of efficiency, this method does not jeopardize their functionality or impair their lifespan and does not consume any computation, memory or energy resources from IoT devices. Most of the researcher use network traffic as a detection sources to detect botnet as used by (Cid-fuentes, Szabo, and Falkner, 2018). A challenge that researcher faced is high computational requirements of processing large amounts of network information. In address this problem, a researcher by scalable and decentralized framework that can discover unseen botnet traffic. This research use network-based detection method. For their experiment, ISCX botnet dataset has been used that consists of combination of three other dataset and contain traffic from 16 different IRC, P2P and HTTP based botnets. As a result, it shows TPR of 100% and 0.082% of FPR. This method significantly improves the results reported by similar works on the same dataset. The disadvantage, it generates a high FPR for ISCX dataset. According to (Chen and Lin, 2014), botnets are difficult to discover their existence. Most of the time, botnets use IRC as a communication channel. A researcher proposed anomaly score-based botnet detection to identify the botnet activities by using similarity and characteristics of botnets. In this research, it uses a few different datasets in order to proof their method, and the result shows TPR over than 90% and FPR below than 7%. According to (Gu, Perdisci, Zhang, and Lee, 2015), most of the botnet detection approaches only on specific botnet C&C protocols and structure. In this paper, a researcher approaches a general detection framework that is independent of botnet C&C protocol and structure and requires no a priori knowledge of botnets that captured bot binaries and botnet signatures. In this paper, BotMiner do passive analyze network traffic in the monitored network to detect compromised machines that may be a part of botnet. In this case, it uses network traffic to observe a traffic like a most researchers do. To complete this research, a researcher test performance on several network traffic from their campus network and collected botnet data. From the result of this research, they get high TPR and for FPR. A weakness of this method, BotMiner is not complete. Based on the (B and Lim, 2019), most of the malware attacks on IoT devices is Mirai such IP cameras, DVRs and routers in large-scale networks. In this paper, researcher developed a network-based algorithm to detect IoT bots that infected by Mirai or similar malware. This algorithm able to scan network for vulnerable IoT devices before it involved in actual attack using scanning matrix. Firstly, a researcher analyzes the traffic signatures produced by Mirai malware that infecting IoT devices to identified signatures that can be used to detect the presence of Mirai in devices. Then, network-based algorithm will be used to detect Mirai malware that based on a novel two-dimensional sampling approach. The experiment uses 100 IoT devices and it provide 40% of vulnerable devices after scanning. According to (Nguyen, 2018), IoT devices are increasingly being implemented in different domains and for distinct purposes. A researcher from this article claimed convolutional neural networks (CNN) being proposed to overcome the issue of heavy manually task of characteristic extraction. This approach used to identify malware without extracting pre-selected characteristics. Combining PSI graph and CNN classifier is the entire novel strategy for identifying malware in IoT devices. To complete the experiment of this approach, it uses 10033 ELF includes 4002 IoT botnet samples and 6031 benign. As a result, it demonstrates that PSI graph CNN classifier achieves 92% precision and a F-measure of 94%. Table 3.1: Summary study of IoT botnet detection approachesAuthor | Title | Method | Detection Sources | Description | Result |
(Elovici et al., 2018) | N-BaIoT—network-based detection of IoT botnet attacks using deep autoencoders | Network-based anomaly detection method | Network traffic | This approach extracts behavior snapshots of the network and use deep autoencoders to detect anomalous network traffic | 100% accuracy |
(Cid-fuentes et al., 2018) | An adaptive framework for the detection of novel botnets | Network-based botnet detection | Network traffic | The proposed method to solve problem of unseen botnet traffic. | 100% accuracy |
(Chen and Lin, 2014) | Detecting botnet by anomalous traffic | Anomaly score based botnet detection. IRC-based botnet detection. | Network traffic (IRC traffic) | This method is proposed to identify botnet activities using similarity measurement and periodic characteristics of botnets. | 90% accuracy |
(Gu et al., 2015) | Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection | Clustering analysis Passive analyses C-plane clustering A-plane clustering | Network traffic | To detect groups compromised machines within a monitored network that are part of a botnet | 75% accuracy |
(B and Lim, 2019) | Early detection of Mirai-like IoT bots in large-scale networks trough sub-sampled packet traffic analysis | Network-based algorithm Scanning matrix | Network traffic (large-scale networks) | To detect IoT bots infected by Mirai or similar malware in large-scale networks. Using scanning matrix for vulnerable and non-vulnerable devices. | 100% accuracy |
(Nguyen, 2018) | Iot botnet approach based on PSI graph and DGCNN classifier | -Deep graph convolutional neural network classifier(DGNN) based detection -PSI graph | Network traffic | This paper proposed combination of PSI graph and CNN to detect malware in IoT devices. In ELF file, a cfg is served as a base for generate psi graph, then use DGCNN for training and testing psi graphs. | 92% accuracy (CNN classifier) 94% accuracy f-measure |
Author | Title | Method | Detection Sources | Description | Data sets | Result |
(Daya et al., 2019) | A graph-based machine learning approach for bot detection | -graph-based method supervised machine learning -graph-based method unsupervised machine learning | Network traffic | Using two-phased which is unsupervised (phase 1) and supervised (phase 2) ml to analyse network traffic and it suitable for large-scale data. | Ctu-13 that have 13 different subset datasets | 91% accuracy |
(Ding et al., 2018) | A malware detection method based on family behavior graph | -graph-based detection method using dependency (directed) graph. -dynamic taint analysis technique. -graph matching algorithm | System calls | This method was used to create a behavior graph of conduct for each group of malware. To discover a relationship between system calls, the method of dynamic taint analysis is used. | -six families of malware -benign samples collected randomly | 96.2% accuracy |
(Li et al., 2018) | Modelling and clustering attacker activities in iot through machine learning techniques | Matrix with resort to graph-based clustering | Network traffic | This approach for modelling attacker activities based on the intuitive observations | Datasets from 10 honeypots in real-world environment which is 241,963 attacks. | Activity pattern identified |
(Nikolopoulos & Polenakis, 2017) | A graph-based model for malware detection and classification using system-call groups | -dependency graphs (scd-graphs) -dynamic taint analysis | System call groups | This proposed method used to define similarity between two system call groups. | -2631 malware samples pre-classified into 48 families of malware. -testing on unknown sample file. | 94.70% accuracy |
(Lee & Lee, 2014) | Gmad: graph-based malware activity detection by dns traffic analysis | -proposed dns behavior property: sequential correlation -dependency between two domain names | Dns traffic | This graph used the domain names as a directed node and sequential correlation as a relationship between two nodes. | -dns traffic captured from dns servers in large isp networks | 95.75% accuracy |
(Nagaraja, 2014) | Botyacc: unified p2p botnet detection using behavioral analysis and graph analysis | -graph-based detection. -partitioning technique. -laplacian matrix | Network traffic | This method use to unify two well understood principles of botnet detection for p2p connectivity and traffic similarity. | Testbed of 25 servers within a test network connected to the internet | 98% accuracy |
(Iliofotou et al., 2011) | Graption: a graph-based p2p traffic classification framework for the internet backbone | Graph-based classification method Traffic dispersion graphs (tdgs) K-means | Network traffic(p2p traffic) | This approach use to classify traffic at the backbone | Three backbone traces from a tier-1 isp and the abilene (internet2) network. | 95% accuracy |
(Park et al., 2010) | Fast malware classification by automated behavioral graph matching | -classification method based on maximal common subgraph detection. -a behavior graph | System call | The proposed method define similarity between two behavioral graphs. | -set of 300 malware instances in 6 families. -80 benign windows applications. | 59.45% accuracy |
(Shang et al., 2010) | Detecting malware variants via function-call graph similarity | -function-call graph as signature -a novel algorithm | Dll | This method used to compute graph similarity between two program | Several malware families from vx heavens | 100% accuracy |
(Camelo et al., 2010) | Condenser: a graph-based approach for detecting botnets | Graph-based approach Clustering algorithm | Network traffic | Graph-based knowledge representation framework where the data have been stored | -top 10,000 domains from alexa for benign -10,000 dga domains provided by anubisnetworks as an anomalous dataset | 77.9%precision |
Indicators | Baseline | Project activities related to indicator | Outputs and outcomes | Status |
---|---|---|---|---|
How do you measure project progress, linked to the your objectives and the information reported on the Implementation and Dissemination sections of this report. | Refers to the initial situation when the projects haven’t started yet, and the results and effects are not visible over the beneficiary population. | Refer to how the project has been advancing in achieving the indicator at the moment the report is presented. Please include dates. | We understand change is part of implementing a project. It is very important to document the decision making process behind changes that affect project implementation in relation with the proposal that was originally approved. | Indicate the dates when the activity was started. Is the activity ongoing or has been completed? If it has been completed add the completion dates. |
Types of IoT Botnets Malware |
Gender Equality and Inclusion:[Back to table of contents]
IoT botnets attack does not focusing on specific target since IoT environment does require constant on network which the attack can spread all connected devices. Thus, the awareness of IoT botnets need to be gain for all gender if they are using IoT devices in their daily life. Men (66%) were slightly more likely than women (61%) to report having had security problems such as having an account compromised or hacked, or accidentally installing spyware, malware or a virus. Even so, women felt markedly less confident (52%) than men (33%) that they were protected from a range of security problems such as phishing, pharming, or having their bank, computer, or online accounts hacked. While women felt less secure, they were only marginally more likely (68%) than men (65%) to say they would like access to additional layers of online protection. An interesting difference between the ways men and women act to protect themselves online emerged in the survey. Women tend to rely more on personal means of protection than men. For example, it was noted earlier that women are more careful than men about the personal information they share online. Women (62%) were also more likely than men (49%) to make use of personalized privacy settings. After they experienced a security problem, women (61%) were more likely than men (51%) to make lasting changes in their online behavior in order to protect themselves from future problems. Men, on the other hand, tend to rely marginally but consistently more on technical means of protection. Men tend to make greater use of VPNs (13% vs. 8% for women), email encryption programs (10% vs. 7%), IP masking sites (10% vs. 5%), password managers (20% vs. 17%), privacy enhancing browser plug-ins (18% vs. 13%) and two-factor authentication (15% vs. 12%). It may be that men are more confident than women that they are protected online because they tend to rely more heavily on technical means of protection. It may also be that men are more likely to be clueless when it comes to online security. The survey asked respondents whether they agreed with the statement "There’s no real danger in sharing personal information online". It's difficult to imagine that anyone who is even slightly familiar with the internet would agree with this statement. Nevertheless, 22% of men, compared to 15% of women, somewhat or completely agreed. In addition, while men were slightly more likely than women to report having experienced security problems, they were much more confident that they were protected online. There’s an obvious disconnect here. When you consider all of this in combination with the many ways that women are more careful about the information they share online, it’s hard to avoid the conclusion that women tend to be more sensible than men about protecting themselves on the internet.Project Communication Strategy:[Back to table of contents]
This research will have a collaboration with Malaysian government sector, Cyber Security Malaysia (CSM) that can help the research further in several phases of research activities. Since the testbed environment may have a difficulties when gathering the data, CSM will help the research by lending various dataset that might helping the research even further. Project planning begins with the formation of a local project planning committee or group. Whenever possible, tribes and organizations should use a team approach to plan new projects which involves staff, community members, community or organizational leadership, and a grant writer or consultant if necessary. The committee members play an important role in keeping the project planning process on track while also ensuring everyone has the opportunity to participate. The committee can organize meetings, conduct surveys, gather and analyze information, and meet with other agencies and organizations. This team will develop the project plan and use it to write the different parts of the application. Generally, you want to spend approximately 80% of your time planning your project and 20% of your time writing and packaging the grant application. Once your team is in place, the planning process generally begins with an assessment of community problems and issues involving various methods to gather community input. Based on information gathered, project developers can identify problems and issues or interests common to all members of the community to begin the process of setting community priorities. Perhaps one of the most daunting aspects of project planning is ensuring community involvement, because it requires the knowledge and skills necessary to set up and conduct or facilitate effective planning sessions, large meetings, and presentations. Public meetings are essential to the development of a project with broad grassroots support. Meetings should be held regularly throughout the planning process. Properly facilitated meetings provide a great way to gather traditional, cultural, and local knowledge. They also serve as a means to receive input on goals, objectives, and activities in order to determine ways to best prioritize them. Project planning involves a series of steps that determine how to achieve a particular community or organizational goal or set of related goals. This goal can be identified in a community plan or a strategic plan. Project plans can also be based on community goals or action strategies developed through community meetings and gatherings, tribal council or board meetings, or other planning processes. The planning process should occur before you write your application and submit it for funding. Project planning: identifies specific community problems that stand in the way of meeting community goals. creates a work plan for addressing problems and attaining the goals. describes measurable beneficial impacts to the community that result from the project’s implementation. determines the level of resources or funding necessary to implement the project. Communication is the process of transmitting ideas and information. For a grass roots initiative or community based organization, that means conveying the true nature of your organization, the issues it deals with, and its accomplishments to the community. Communication can take many forms, including:- Word of mouth
- News stories in both print and broadcast media
- Press releases and press conferences
- Posters, brochures, and fliers
- Outreach and presentations to other health and community service providers and to community groups and organizations
- Special events and open houses that your organization holds
- A plan will make it possible to target your communication accurately. It gives you a structure to determine whom you need to reach and how.
- A plan can be long-term, helping you map out how to raise your profile and refine your image in the community over time.
- A plan will make your communication efforts more efficient, effective, and lasting.
- A plan makes everything easier. If you spend some time planning at the beginning of an effort, you can save a great deal of time later on, because you know exactly what you should be doing at any point in the process.