| Literature DB >> 30754667 |
João Marcelo Ceron1, Klaus Steding-Jessen2, Cristine Hoepers3, Lisandro Zambenedetti Granville4, Cíntia Borges Margi5.
Abstract
IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets' intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.Entities:
Keywords: IoT; SDN; botnet; malware; malware analysis
Year: 2019 PMID: 30754667 PMCID: PMC6386856 DOI: 10.3390/s19030727
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Adaptive network layer overview.
Figure 2Mirai Scan Signature: The TCP scan packets are instantiated using the same value for the fields destination IP address and TCP Sequence number.
Figure 3C&C Protocol: Message exchange process implemented by Bashlite and Mirai malware families.
Figure 4Malware analysis environment setup.
Figure 5Bashlite’s execution flow: the bot initially establishes a communication with the C&C and then performs the propagation attacks scans.
Figure 6Mirai’s execution flow: The malware initiates the propagation scan process and simultaneously contacts its C&C.
Figure 7Bashlite egress traffic: the number of packets per hour generated by the analyzed malware.
Figure 8Mirai egress traffic: the number of packets per hour generated by the analyzed malware.