ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

03/26/2021
by   Hisham Alasmary, et al.
0

The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform a variety of functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to IoT devices, malware authors can abuse the Linux shell of those devices to propagate infections and launch large-scale attacks, e.g., DDoS. In this work, we provide a first look at shell commands used in Linux-based IoT malware towards detection. We analyze malicious shell commands found in IoT malware and build a neural network-based model, ShellCore, to detect malicious shell commands. Namely, we collected a large dataset of shell commands, including malicious commands extracted from 2,891 IoT malware samples and benign commands collected from real-world network traffic analysis and volunteered data from Linux users. Using conventional machine and deep learning-based approaches trained with term- and character-level features, ShellCore is shown to achieve an accuracy of more than 99

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2020

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning

With the increase of IoT devices and technologies coming into service, M...
research
06/21/2019

Joint Detection of Malicious Domains and Infected Clients

Detection of malware-infected computers and detection of malicious web d...
research
08/05/2020

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic

In this paper, we present MORTON, a system that identifies compromised e...
research
08/05/2019

On the security of ballot marking devices

A recent debate among election experts has considered whether electronic...
research
12/07/2022

RADAR: Effective Network-based Malware Detection based on the MITRE ATT CK Framework

MITRE ATT CK is a widespread ontology that specifies tactics, techniqu...
research
06/01/2021

MalPhase: Fine-Grained Malware Detection Using Network Flow Data

Economic incentives encourage malware authors to constantly develop new,...
research
06/09/2020

Spatial Firewalls: Quarantining Malware Epidemics in Large Scale Massive Wireless Networks

Billions of wireless devices are foreseen to participate in big data agg...

Please sign up or login with your details

Forgot password? Click here to reset