دورية أكاديمية

Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems.

التفاصيل البيبلوغرافية
العنوان: Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems.
المؤلفون: Cassavia, Nunziato, Caviglione, Luca, Guarascio, Massimo, Liguori, Angelica, Zuppelli, Marco
المصدر: Journal of Intelligent Information Systems; Aug2024, Vol. 62 Issue 4, p925-949, 25p
مصطلحات موضوعية: COMPUTER network traffic, CYBERTERRORISM, TELECOMMUNICATION systems, COMMUNICATIVE competence, LEAKS (Disclosure of information), INTRUSION detection systems (Computer security), BOTNETS
مستخلص: Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate resource-constrained devices within a botnet or leak sensitive information. A major research effort is then devoted to create countermeasures for mitigating attacks, for instance, hardware-level verification mechanisms or effective network intrusion detection frameworks. Unfortunately, advanced malware is often endowed with the ability of cloaking communications within network traffic, e.g., to orchestrate compromised IoT nodes or exfiltrate data without being noticed. Therefore, this paper showcases how different autoencoder-based architectures can spot the presence of malicious communications hidden in conversations, especially in the TTL of IPv4 traffic. To conduct tests, this work considers IoT traffic traces gathered in a real setting and the presence of an attacker deploying two hiding schemes (i.e., naive and "elusive" approaches). Collected results showcase the effectiveness of our method as well as the feasibility of deploying autoencoders in production-quality IoT settings. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Intelligent Information Systems is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:09259902
DOI:10.1007/s10844-023-00819-8