| Literature DB >> 35161823 |
Alyaa A Hamza1,2, Islam Tharwat Abdel Halim3,4, Mohamed A Sobh2, Ayman M Bahaa-Eldin5.
Abstract
Established Internet of Things (IoT) platforms suffer from their inability to determine whether an IoT app is secure or not. A security analysis system (SAS) is a protective shield against any attack that breaks down data privacy and security. Its main task focuses on detecting malware and verifying app behavior. There are many SASs implemented in various IoT applications. Most of them build on utilizing static or dynamic analysis separately. However, the hybrid analysis is the best for obtaining accurate results. The SAS provides an effective outcome according to many criteria related to the analysis process, such as analysis type, characteristics, sensitivity, and analysis techniques. This paper proposes a new hybrid (static and dynamic) SAS based on the model-checking technique and deep learning, called an HSAS-MD analyzer, which focuses on the holistic analysis perspective of IoT apps. It aims to analyze the data of IoT apps by (1) converting the source code of the target applications to the format of a model checker that can deal with it; (2) detecting any abnormal behavior in the IoT application; (3) extracting the main static features from it to be tested and classified using a deep-learning CNN algorithm; (4) verifying app behavior by using the model-checking technique. HSAS-MD gives the best results in detecting malware from malicious smart Things applications compared to other SASs. The experimental results of HSAS-MD show that it provides 95%, 94%, 91%, and 93% for accuracy, precision, recall, and F-measure, respectively. It also gives the best results compared with other analyzers from various criteria.Entities:
Keywords: data security; smart homes; software verification; triggers/actions
Year: 2022 PMID: 35161823 PMCID: PMC8839744 DOI: 10.3390/s22031079
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Security analysis systems for IoT applications.
Figure 2SmartThings Platform Architecture.
An Overview of Security Analysis Systems (SAS) in IoT applications.
| Ref. | SAS. Name | Analysis Type | Analysis Technique | The Main Work | Advantages | Limitations |
|---|---|---|---|---|---|---|
| [ | Soteria | Static | Model-Checking | Extracts a state model from the code of an IoT application to verify if an application or multi-app system respects security, safety, and functional properties. | SOTERIA analysis on MALIOT indicated it was accurate at recognizing 17 of 20 separate | 1: The use of call diagnosis by reflection. |
| [ | IoTCOM | Static | Model-Checking | Explains how to construct a flexible model extractor | IoTCOM reduces the violation detection | Depends on all static and dynamic features, which may include unnecessary features. |
| [ | IotSan | Static | Model-Checking | Employs the model-checking approach to identify the causes of cyber vulnerabilities and provides actual precedents to clarify such triggers. | Recognizes 147 vulnerabilities. | 1: The checker of the Spin model cannot manage a file size more significant than that of the Promela code. |
| [ | IoTGuard | Dynamic | Code-Instrumentation | Works in three phases: (a) execution of a code instrumentor; (b) storing data of the apps in a dynamic model; (c) detection of IoT security on the dynamic model | IoTGuard introduces 11 single measures, | Enables a user to define policies through IOTGUARD’s GPL. |
| [ | PATCH EC-KO | Hybrid | Deep-Learning | Optimizes deep learning and hybrid static-dynamic binary analysis to execute multi-platform binary code similarity analysis to identify vulnerabilities without high-precision source code access. | The PATCHECKO differential engine | The accuracy is not a high ratio. |
| [ | IOTFUZZER | Dynamic | Taint-Tracking and | IOTFUZZER, which aims at identifying vulnerabilities to memory corruption in IoT devices without accessing their firmware images. | IOTFUZZER successfully found 15 | 1: Scope of testing. |
| [ | Soteria2 | Static | Convolutional | A random walk-based traversal method for feature extraction employs both density-based and level-based CFG labels to achieve consistent representation. | Soteria achieves a 97.79% accuracy rate for detecting AEs and 99.91% accuracy of malware groups | 1: CFG does not necessarily reflect the actual code. |
Figure 3The research scope of the proposed analyzer.
Figure 4Smart home apps, including malicious third-Party apps.
Figure 5HSAS-MD analyzer phases.
Figure 6HSAS-MD Analyzer Architecture.
Figure 7The static analysis phase in the HSAS-MD.
Figure 8The dynamic analysis phase in the HSAS-MD.
Rule representation model.
| No. | Slot Names | Description |
|---|---|---|
| 1 | Rule (Rh) | (trigger) (condition) (action) |
| 2 | Trigger (Th) | (capabilities) (attribute) (value) |
| 3 | Condition (Ch) | (capabilities) (attribute) (value) |
| 4 | Action (Ah) | (capabilities) (attribute) (value) |
| 5 | Event | (subject) (attribute) |
| 6 | Constraint | logical expression | null |
Rules description of the IoT apps dataset in a smart home.
| Application Name | Capabilities | Rule No. | Triggers | Conditions | Actions |
|---|---|---|---|---|---|
| AutoLockafter | lock1 + state | R0 | |||
| no value | |||||
| R1 | no triggers | ||||
| AutoLockDoorsv2 | lock1 + state | R0 | |||
| no value | |||||
| R1 | no triggers | ||||
| DoorAutoLock | lock1 + state | R0 | |||
| no value | |||||
| R1 | no triggers | ||||
| DoorsUnlocked | presence1 + lock1 | R0 | |||
| no value | |||||
| IfFloodTurnValveOff | alarm + valve | R0 | |||
| ItsTooCold | temperatureSensor1 + switch1 | R0 | |||
| no value | |||||
| LightOnCold | temperatureSensor1+ switch1 | R0 | |||
| no value | |||||
| Motion TriggersLock | motion1 + lock1 | R0 | |||
| DelayedCommandExecution | contact1 + switch1 | R0 | |||
| no value | |||||
| R1 | |||||
| no value | |||||
| UnlockitWhenitOpens | contact1 + Lock1 | R0 | |||
| no value |
Figure 9The DL phase in the HSAS-MD.
Figure 10The test of the CNN phase at the HSAS-MD analyzer.
Figure 11The second test of the CNN phase at the HSAS-MD analyzer.
Description of the Confusion Matrix.
| Indicator | Description |
|---|---|
| True positive (TP) | The number of malware samples was detected correctly and labeled as malware. |
| True negative (TN) | The number of benign samples was correctly detected and labeled as benign. |
| False positive (FP) | The number of benign samples was wrong and labeled as malicious. |
| False negative (FN) | The number of malware samples was wrong and labeled as benign. |
Figure 12Confusion matrix of the proposed HSAS-MD.
A comparison between various SASs based on MCT.
| Paper | SAS Analyzers | Analysis Technique | Analysis Type | Static Analysis Model |
|---|---|---|---|---|
| [ | Soteria | MCT | Static | State |
| [ | IotSan | MCT | Static | State |
| [ | ForeSee | MCT | Static | State |
| [ | IoTCOM | MCT | Static | Rule |
| [ | SIFT | MCT | Static | Rule |
| [ | iRuler | MCT & NLP | Static | Rule |
| [ | TAPInspector | MCT & Slicing | Static | Rule |
| This Paper | HSAS-MD | MCT &CNN | Static & Dynamic | State & Rule |
Figure 13The comparison of the proposed HSAS-MD analyzer with other related analyzers based on ACC, PRC, RCL, and F-MS.
Figure 14The analysis time of the proposed HSAS-MD analyzer with other related analyzers.
Figure 15The performance of the proposed HSAS-MD analyzer with other related analyzers based on the analysis type.
Figure 16The performance of the proposed HSAS-MD analyzer with other related analyzers based on the static analysis model.
Figure 17The verification time of the CNN model to verify rules.
Figure 18The comparison between various CNN models for rule classification.