TY - JOUR
T1 - ARBA
T2 - Anomaly and Reputation Based Approach for Detecting Infected IoT Devices
AU - Rosenthal, Gilad
AU - Kdosha, Ofir Erets
AU - Cohen, Kobi
AU - Freund, Alon
AU - Bartik, Avishay
AU - Ron, Aviv
N1 - Funding Information:
This work was supported in part by the IBM Cyber Security Center of Excellence, Gav-Yam Negev, and in part by the Israeli National Cyber Bureau via the Cyber Security Research Center, Ben-Gurion University of the Negev.
Publisher Copyright:
© 2013 IEEE.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - Today, cyber attacks are constantly evolving and changing, which makes them harder to detect. In particular, detecting attacks in large-scale networks is very challenging because they require high detection rates under real-time resource constraints. In this paper, we focus on detecting infected Internet of Things (IoT) hosts from domain name system (DNS) traffic data. IoT hosts, such as streaming cameras, printers, air conditioners, are hard to protect, unlike PCs and servers. Enterprises are often unaware of the devices which are connected to the network, their types, makes, and vulnerabilities. Since IoT hosts make use of the DNS protocol, analyzing DNS data can give a broad view of malicious activities, because they abuse the DNS protocol and leave fingerprints as part of their attack vector. In this collaborative research between Ben-Gurion University, and IBM, we establish a novel algorithm to detect infected IoT hosts in large-scale DNS traffic, named Anomaly and Reputation Based Algorithm (ARBA). Its novelty resides in developing a framework that combines host classification and domain reputation in a real-time production environment. ARBA is highly computational efficient and meets real-time requirements in terms of run time and computational complexity. By contrast to existing algorithms, it does not require a massive traffic volume for training, which is of significant interest in detecting infected hosts in real-time. The research was conducted on real live streaming data from IBM internal network traffic, and confirm the algorithm's strong performance in a real-time production environment.
AB - Today, cyber attacks are constantly evolving and changing, which makes them harder to detect. In particular, detecting attacks in large-scale networks is very challenging because they require high detection rates under real-time resource constraints. In this paper, we focus on detecting infected Internet of Things (IoT) hosts from domain name system (DNS) traffic data. IoT hosts, such as streaming cameras, printers, air conditioners, are hard to protect, unlike PCs and servers. Enterprises are often unaware of the devices which are connected to the network, their types, makes, and vulnerabilities. Since IoT hosts make use of the DNS protocol, analyzing DNS data can give a broad view of malicious activities, because they abuse the DNS protocol and leave fingerprints as part of their attack vector. In this collaborative research between Ben-Gurion University, and IBM, we establish a novel algorithm to detect infected IoT hosts in large-scale DNS traffic, named Anomaly and Reputation Based Algorithm (ARBA). Its novelty resides in developing a framework that combines host classification and domain reputation in a real-time production environment. ARBA is highly computational efficient and meets real-time requirements in terms of run time and computational complexity. By contrast to existing algorithms, it does not require a massive traffic volume for training, which is of significant interest in detecting infected hosts in real-time. The research was conducted on real live streaming data from IBM internal network traffic, and confirm the algorithm's strong performance in a real-time production environment.
KW - Cyber security
KW - anomaly detection
KW - detection algorithms
KW - domain name system (DNS)
KW - real-time algorithms
UR - http://www.scopus.com/inward/record.url?scp=85090278393&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2020.3014619
DO - 10.1109/ACCESS.2020.3014619
M3 - Article
AN - SCOPUS:85090278393
VL - 8
SP - 145751
EP - 145767
JO - IEEE Access
JF - IEEE Access
SN - 2169-3536
M1 - 9160931
ER -