Proceedings of the 2019 7th International Conference on Computer and Communications Management 2019
DOI: 10.1145/3348445.3348474
|View full text |Cite
|
Sign up to set email alerts
|

Towards a rooted subgraph classifier for IoT botnet detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Since the source code can be represented as an abstract syntax tree, several graph embedding models have been proposed to help detect malware code by learning dependency graphs. The dependency graph is built with API function nodes and directed edges representing other functional queries from the current function [320,321]. For instance, Narayanan et al [320] built rooted subgraphs that capture the connection between API functions in source code.…”
Section: Computer Securitymentioning
confidence: 99%
“…Since the source code can be represented as an abstract syntax tree, several graph embedding models have been proposed to help detect malware code by learning dependency graphs. The dependency graph is built with API function nodes and directed edges representing other functional queries from the current function [320,321]. For instance, Narayanan et al [320] built rooted subgraphs that capture the connection between API functions in source code.…”
Section: Computer Securitymentioning
confidence: 99%
“…IoT malware is malicious software designed to access, exploit and compromise an IoT device; it is different from other malware in that it has the ability to adapt to various CPU architectures, including MIPS, ARM, Intel x86 and PowerPC [56]. IoT malware has various essential models to finish its functions, including a scanner, an attacker and a killer [86].…”
Section: Downloading Iot Malwarementioning
confidence: 99%
“…After scanning and receiving the information of a vulnerable IoT device, the attacker uses a downloader server to download the bot. After that, the new bot starts its functions and communication with the C&C. Some of the selected studies concentrated on proposing techniques for detecting whether an input executable file is malware or benign [49,56,69,79]. As Figure 8 explained, 19% of the studies concentrated on this type of attack-nine studies, as Table 10 displays.…”
Section: Downloading Iot Malwarementioning
confidence: 99%
See 1 more Smart Citation
“…24 Nguyen et al proposed a method that combines deep learning and machine learning for botnets detection. 25 Dietz et al present an IoT botnets detection and isolation approach, which can prevent the compromise of IoT devices substantially. 26 Liu et al propose a deep learning-based approach for IoT botnets detection.…”
Section: Related Workmentioning
confidence: 99%