SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 2, April 2020, pp. 2182∼2191
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp2182-2191 Ì 2182
SIEM-based detection and mitigation of IoT-botnet
DDoS attacks
Basheer Al-Duwairi, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abdelqader, Abdullah Rawash,
Rana Fahmawi
Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan
Article Info
Article history:
Received Aug 10, 2019
Revised Oct 9, 2019
Accepted Oct 30, 2019
Keywords:
IoT botnets
Network security
SIEM
ABSTRACT
The Internet of Things (IoT) is becoming an integral part of our daily life includ-
ing health, environment, homes, military, etc. The enormous growth of IoT in recent
years has attracted hackers to take advantage of their computation and communication
capabilities to perform different types of attacks. The major concern is that IoT
devices have several vulnerabilities that can be easily exploited to form IoT botnets
consisting of millions of IoT devices and posing significant threats to Internet security.
In this context, DDoS attacks originating from IoT botnets is a major problem in
today’s Internet that requires immediate attention. In this paper, we propose Secu-
rity Information and Event Management-based IoT botnet DDoS attack detection and
mitigation system. This system detects and blocks DDoS attack traffic from compro-
mised IoT devices by monitoring specific packet types including TCP SYN, ICMP and
DNS packets originating from these devices. We discuss a prototype implementation
of the proposed system and we demonstrate that SIEM based solutions can be config-
ured to accurately identify and block malicious traffic originating from compromised
IoT devices.
Copyright c 2020 Insitute of Advanced Engineeering and Science.
All rights reserved.
Corresponding Author:
Basheer Al-Duwairi,
Jordan University of Science and Technology,
Irbid 22110, Jordan.
Tel: +962-02-7201000 (Ext. 24000)
Email: basheer@just.edu.jo
1. INTRODUCTION
Internet of things (IoT) have witnessed enormous growth in recent years. This growth is due to the
significant development in semiconductor industry, wireless communication technologies and the emergence
of IoT applications in different fields in our daily life including: smart homes [1], health care sector [2],
industrial control systems [3] and military applications [4]. According to Statista [5], the number of IoT
connected devices is estimated to be about 23.4 billion and is expected to increase to 31 billion in 2020.
Motivated by the significant growth of IoT, hackers are eager to take advantage of their computation
and communication capabilities to perform different types of attacks. Botnets represent the primary source of
many attacks targeting the Internet. A botnet is a network of compromised machines (e.g. computers, smart-
phones, IoT devices, etc.) which are controlled by an attacker (botmaster) and used to perform a variety of
activities such as distributed denial of service (DDoS) attacks, spamming, click fraud, and phishing attack. IoT
devices are creating a huge risk to security compared to the ordinary Internet connected devices because of
their large number, resource limitation and protocol diversity, which makes IoT a valuable target for attack-
ers to create IoT botnet. For example, an attacker can compromise victim’s IoT smart home devices [1] to
obtain sensitive information, or to use IoT devices as IoT Botnets [6] in order to execute a distributed denial-
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2183
of-service attacks (DDos) against critical cyber-physical systems. On October 21, 2016, Attackers launched
a DDoS attack against Dyn DNS service [7] by utilizing Mirari IoT botnet causing many services and internet
platforms to be unavailable in Europe and North America.
Previous research efforts have focused on devising mechanisms to detect vulnerable or compromised
IoT devices or to secure IoT devices despite of their computing, storage and power limitations. IoT devices
usually exchange different types of messages and generate huge amount of data making it difficult to monitor
and correlate events and detect malicious activities originating from them. In this paper, we address the problem
of DDoS attacks originating from IoT botnets by using Security Information and Event Management (SIEM)
solution in such a way to detect and block attack traffic. The main contributions of the paper are as follows:
(a) A SIEM-based IoT botnet detection system. The proposed system adopts Splunk SIEM solution [8] to
identify and block traffic from compromised IoT devices by monitoring specific packet types including
TCP SYN, ICMP and DNS flooding.
(b) The implementation of a prototype of an IoT botnet detection system based on the proposed Security
Information and Event Management (SIEM) solution, and application of the proposed system to detect
three common DDoS attack types.
(c) Review of different aspects of IoT botnets focusing mainly on IoT botnet architectures, main types,
countermeasures, and discusses recent research efforts in this field.
The rest of this paper is organized as follows: background information about IoT botnets and presents main
features and limitations of IoT devices are presented in Section 2. Related work is discussed in Section 3.
The proposed system and the prototype implementation of the SIEM-based IoT Botnet DDoS attack detec-
tion and mitigation is discussed in Section 4. Evaluation of the proposed system is presented in Section 5.
Finally, conclusions are presented in Section 6.
2. BACKGROUND ABOUT IOT BOTNETS
A Botnet is a group of compromised devices that are manipulated using command and control channel
to perform malicious activities. Recently, IoT botnets have emerged as a new type of botnets where hackers
control millions of compromised IoT devices and utilize them in their malicious attacks. Generally, an IoT
botnet consists of the following components:
(a) Bots: compromised IoT devices used to perform the different types of attacks (e.g., denial of service).
(b) Command and Control Server: Server used to control the Bots.
(c) Scanners: used to scan for vulnerable IoT devices.
(d) Reporting Server: Server used to collect scanning reports from scanner or Bots.
(e) Loader: instruct IoT devices to download the malware code after logging at the vulnerable IoT devices.
(f) Malware Distribution Server: A server responsible for malware distribution.
IoT devices have been widely utilized in many large-scale DDoS attacks. In these attacks, IoT devices are
instructed by the botmaster to flood a target system with huge amount of packets (e.g. SYN, DNS, ICMP,
etc.). Zhou et al [9], discussed several features of IoT devices that contributes to the problem of IoT botnets.
These features include:
(a) Constrained Compared to traditional PCs and mobile devices, IoT devices usually have limited compu-
tational capabilities and storage resources due to cost and physical conditions constraints.
For example, IoT devices used in a military environment have to work for a long time on battery.
Therefore, power-consuming applications can not run on such devices. On the other hand, IoT devices
used in the medical sector are time- constrained. Therefore, time-consuming applications can not run
on such devices in order to avoid delay in the response. Because of such limitations, we cannot deploy
the required defense systems on these devices such as complex encryption and authentication techniques
that consume computing and storage resources, and thus create many vulnerabilities that can be exploited
by hackers.
(b) Diversity IoT technology is increasingly used in many real life applications. As a result, there are
many IoT vendors with large number of heterogeneous IoT products that have their own network and
communication protocol implementations. In most cases, many of these products do not have security
included in their design . According to HP report in 2015, 80% of IoT devices are working with a default
password, 70% are not using encryption during communication and 60% of IoT devices have weak web
interface and are not updated [10]. On the other hand, different IoT companies may develop different
communication protocols which may result in vulnerabilities that could be exploited by adversaries.
SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
2184 Ì ISSN: 2088-8708
(c) Myriad This feature describes the increasing number of IoT devices and the data generated by them.
Due to the lack of security in IoT devices, and because of the power and computing limitations, this will
create an army of IoT zombie that could be exploited in many attacks such as DDoS attacks. Yin et al
[11] found that most large-scale DDoS attacks caused by IoT devices, he proved this by using honey bot
and sand box to collect attack samples of IoT devices.
(d) Unattended This feature is related to IoT devices that work for a long period of time without physical
access to verify the state of these devices or to detect if it has been attacked. Ronen et al [12] implemented
an attack on Philips’s smart light bulb by exploiting vulnerability in the protocol and show how fast the
developed worm will spread over the other bulbs.
(e) Mobility Many IoT devices (e.g., wearable devices) will have to hop from one network to another and
communicate with different devices according to the human movement. This mobility feature of IoT
devices gives hackers better chances to compromise mobile IoT devices.
3. RELATED WORK
There have been substantial amount of work about IoT security. In this section, we provide a review
of the recent advances in this field focusing on detecting IoT devices vulnerabilities, detecting IoT network
vulnerabilities, and detecting IoT botnets.
3.1. Detecting IoT devices’ vulnerabilities
IoT devices’ vulnerabilities can be detected by making static analysis of their frameworks.
For example, Ronen et al. [12] described a threat in which IoT devices can rapidly infect each other by
any newly developed malware. They prove this by exploiting a vulnerability in the implementation part
of Zigbee light protocol of Philips Hue smart lamps to perform a remotely firm-ware update. Then they
perform side channel attack to extract the key used by Philips smart lamps to encrypt and authenticate the
update. After that, the worm rapidly spread from the infected lamp to the other lamps using their ZigBee
wireless connectivity. Such attack enables an attacker to control city lighting or to exploit the lamps in DDoS
attacks. Costin et al. [13] performed a large-scale security analysis of 32 thousand of firmware images of
embedded devices, and found 38 unknown vulnerabilities in more than 693 firmware images which extend
in 123 different products. Fernandes et al. [14] performed static source code analysis and crafted tests on 123
smart Home platforms and 499 smart things applications. They discovered two flaws in the design of these
platforms. These design flaws lead to grant Smart Things Application over privileged rather than a separated
privilege as designed, beside the full access of these applications to the Smart Home Device rather than the
limited access as designed. They also proved that the asynchronous communication (event subsystem) between
devices and Smart Applications is not secure and could leak sensitive information.
Several research efforts have been made to develop Internet Wide Scan technologies to search for
vulnerable IoT devices. Kim et al [15] proposed a model to improve the performance of the Internet Wide
Scanner Zmap [16]. This model consists of three modules:1. IP alive scan which collect IoT device status
information.2. Reactive Protocol scan which collect network and service information.3. OS fingerprinting
scan which collect operating system information. The proposed model showed an improvement in the result
compared with Zmap. Although the scanning throughput was similar to Zmap in IP alive scanning but it was
118% better in generating IP addresses that were not filtered by security devices. Port scanning also showed
129% better performance compared to Censys based on ZMap and the Operating system identification showed
50% better identification accuracy compared with 10-20% for Zmap using exact matching technique.
3.2. Detecting IoT network vulnerabilities
There are several approaches for detecting IoT network vulnerabilities. These approaches can be
classified into fuzzing-based techniques, graph-based analysis, and network traffic pattern-baed analysis.
3.2.1. Fuzzing based
Fuzzing is a security technique used to detect vulnerability in network protocol by sending test files
with false data to a software implementing the tested protocol, and then observe resulting software exceptions
to detect the vulnerabilities. There are two kinds of Fuzzing techniques:1. Mutation based: test files generated
by injecting random and false data in sample messages. 2: Generating based: test files generate by constructing
messages with random and false data based on specific protocol specifications. The main problem of this
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2185
method is that the number of test files is large and consume a lot of time and many of these test files do not
follow the rules of message format of many protocols. Luo et al [17], proposed a technique based on protocol
reverse engineering, to identify the message format of protocols and create test file messages with certain faults
according to the message format. This method reduces the size of test files for Fuzzing. They proposed an
algorithm to detect multi-change-point of the message fields, then classifying it into keyword fields, data fields
and uncertain fields by employing a probability test.
3.2.2. Graph-based analysis
Jia et al [18] verified the effectiveness graph-based analysis on a smart home system consisting of
Google home speaker, smart light pulp and smartphone. Using captured files as input to construct the traffic
graph, they were able to identify the correlated sub-graphs and the vulnerabilities based on the sensitivity level
of different keywords. In their experiment, they analyzed 58,714 collected messages and found 6 vulnerable
sub-graphs that they exploited to launch 6 attacks.
3.2.3. Network traffic pattern-based analysis
It has been shown that the attacker could infer user’s information by analyzing the traffic size and rate
even in case the traffic is encrypted. Li1 et al [19] analyzed the traffic of encrypted video stream for Video
Surveillance Systems and observed that the traffic pattern is different at different user activity, showing that
there is a side-channel information leakage even the video stream is encrypted. Apthorpe et al [20] examined
the network traffic rate of several IoT devices and found that passive network observers, could analyze the
network traffic and infer sensitive information.
3.3. Detecting IoT botnets
Different approaches used to detect IoT botnet at different steps of botnet life cycle. The approaches
used to detect IoT botnet are discussed in the following subsections.
3.3.1. Anomaly-based
This approach detects IoT botnet by recognizing malicious behavior in the network; this approach
requires storing previous profile for the normal behavior for the network. Summerville et al, [21] developed
an ultralight packet anomaly-based method to detect abnormal payload in the packet, using efficient matching
technique for bit pattern requires only ADD operation followed by incremental counter, and implemented as
a look up table for fast and flexible packet evaluation. Sagirlar et al, [22] proposed Auto Bot catcher, which
utilizes Block chain concept to detect decentralized P2P Botnets. The design of AutoBotCatcher is driven
by the concept that bots in the same botnets usually communicate with each other and form a community,
so it will detect the community by analyzing the network traffic between IoT devices and then detect the
botnet. AutoBotCatcher consists of two main actors: agents and block generator. The agent is responsible
for monitoring the network traffic between IoT devices, and sending the collected information as a block chain
transaction to a big trusted entity in the network (block generator), which will model mutual contact information
of IoT device and create mutual contact graph, and then use Louvain method [23] to detect community based
on the graph.
3.3.2. Signature-based
This approach detects the IoT botnet based on the signature of the botnet stored in the database of the
system. P. Ioulianou et al [24] proposed a solution that depends on Intrusion Detection System (IDS), which
is a security technology used to monitor networks for any malicious activity or policy violation. They place
these IDS modules in a hybrid mode. The detection and firewall module called Router IDS and the monitoring
lightweight module called Detector IDS. These modules are distributed in the network close to IoT devices,
and this does not require any software modification on sensors or devices. Detector IDS logs network traffic
and sends it to the Router IDS that will detect malicious node behavior if it resembles to a known attack.
Khoshhalpour et al, [25] proposed a host-based approach called BotRevealer to detect IoT botnet in the early
infection step, using botnet life cycle as a general signature for detection. They analyze the running process and
network activities on the host based on statistical features of packet sequence and compare it with the behavior
pattern of botnet traffic.
SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
2186 Ì ISSN: 2088-8708
3.3.3. Specification-based
This approach is similar to anomaly-based approach but it takes into account system specifications.
Carli et al, [26] proposed an automatic interference technique for the specifications of malware network
protocol using samples of malware communication and malware binary. Since each malware has its own
custom binary format and each C&C protocol has its own malware family, this will provide a fingerprint for the
malware structure and intent. They proposed a type system field of the message that describes all field types
in the message, and then use type interference algorithm to interfere message structure. However, most C&C
network traffic is encrypted so they apply dynamic traffic analysis to extract C&C system keys. Prokofiev et al
[27] proposed a detection technique for IoT botnets during the propagation stage where infected devices starts
to exploit other devices in the network using brute-force attack using telnet and/or ssh protocols. They build
a logistic regression model based on the Request Parameters and Specification such as: (Destination Port, even
number of requests and alphanumeric) to estimate IoT bot. initiates the probability that the connection initiated
to a device. They build the model using the data collected from 100 IoT Botnets.
3.3.4. Hybrid-based
This approach combines two approaches together, anomaly-based and signature-based techniques or
anomaly-based and specification-based techniques, to detects the IoT botnet with high detection and low false
positive rate. Sedjelmaci et al [28] proposed a low energy consumption anomaly and signature based, to detect
attacks effectively using the proposed Game Theory to model the security strategy as a game formula between
the attacks and the IDS agent in the IoT device, and use Nash equilibrium to determine the equilibrium state that
will allow the IDS agent to activate the anomaly detection technique only when the attack signature is expected
to happen, this will reduce the power consumption in IoT device due to anomaly detection techniques and
increase the detection accuracy. In the other hand, Bostani et al [29] proposed anomaly-based and specification-
based intrusion detection models to detect attacks in IoT. The specification-based detection agent will be
located on routers nodes; it will analyze the host node behaviour and send the results to the root node where
the anomaly-based detection agent is located. This agent based on the Map reduce architecture will employ
optimum path algorithm using the data sent by routers nodes to project clustering model and detect malicious
behaviour using voting mechanism.
4. PROPOSED WORK: SIEM-BASED DETECTION AND MITIGATION OF IOT BOTNET DDOS
ATTACKS
In this section, we present the proposed SIEM-based detection and mitigation of IoT botnet DDoS
attacks, focusing on the system overall architecture and a prototype implementation.
4.1. System architecture
SIEM systems are primarily used in the security field to correlate events reported by various network
security defense technologies (e.g., intrusion detection systems, firewalls, bring your own device solutions,
operating systems syslogs, etc.) deployed within an Enterprise network. The results of event correlation
indicate weather there is a security incident or no. There are few recent research studies about the use of
SIEM solutions for IoT security, such in [30, 31]. These studies focused mainly on efficient delivery of IoT
data to the SIEM system for analysis and correlation of events.
Figure 1 depicts the basic architecture of the proposed system. First, IoT traffic logs are forwarded
by the default gateway to the SIEM system. These traffic logs are obtained from various IoT devices in
the monitored network including IP cameras, fingerprint readers, building management system sensors, etc.
The SIEM solution performs a sequence of data processing tasks that include parsing, indexing, and
storing these logs in a highly available secure database. The logs are then analyzed and in case there is any
abnormal behavior compared to the traffic profile of the device in question, it detects an attack and alerts the
network administrator.
DDoS attacks are generally characterized by a high packet volume. Therefore, the detection of DDoS
attacks in our system is based on comparing the number of packets of certain type (e.g., SYN, ICMP, or
DNS) that are destined to a certain machine to a predefined threshold value. Once an attack is detected,
SIEM mitigates the ongoing attack by automatically configuring the firewall application installed on the default
gateway such that new rules are added to block attack traffic. There are multiple SIEM platforms that can gather
machine data.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2187
Figure 1. System Architecture
4.2. Prototype implementation
An enterprise network (e.g., a campus network) usually has different types of IoT devices such as
IP cameras, temperature sensors, fingerprint attendance system, etc. Monitoring these devices individually
would be difficult because of traffic heterogeneity. In this paper, we have implemented a prototype of an IoT
botnet detection system based SIEM solution. Our goal is to show that it is possible to detect different types of
malicious traffic originating from various IoT devices. A prototype implementation of the proposed systems is
shown in Figure 2.
Figure 2. Network topology of the IoT botnet detection prototype
This prototype consists of the following main components:
(a) IoT Botnet: In any organizational network, there are different types of IoT devices that are vulnerable
to botnet infection. In our prototype, we represented the IoT botnet by Raspberry Pi v1 which is an
open source hardware platform that can be used for special purpose IoT devices. We installed a bot code
written in Python scripting language on these devices to generate different types of attack traffic that
include SYN flooding, DNS flooding, and ICMP flooding. In addition, we used a Cisco 2520V camera
with framework Cisco Video Surveillance 2421 IP Dome camera in order to generate background IoT
traffic. Bots receive commands in the format:
(b) (type, count, IP, data), where type represent attack packet type (e.g., SYN, DNS, or ICMP), count
specifies the number of packets to be sent in case of flooding attacks, IP represents the IP address of
the targeted system, and data specifies the port number if in case of SYN flooding attack, or the domain
in case of DNS attack, not used in ping scan. Each bot runs a Python script to conduct the attack based
on the parameters assigned in the command received from the botmaster.
(c) Gateway: We configured a Linux machine to work as the default gateway of the IoT devices.
The machine has two network interfaces. One Interface is facing the Internet and the other one is facing
SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
2188 Ì ISSN: 2088-8708
the local network where IoT devices are located. We run tcpdum on this machine in order to capture IoT
traffic. We used the command:
bash tcpdump– − n– − e– − iinterface” > logfile.log
to capture all outgoing traffic and saving it in a logfile to be forwarded to Splunk server periodically.
Here we used the options -n and -e in order not to convert the IP address and to include MAC addresses
in the traffic capture, respectively. We installed and configured the Splunk forwarder on the gateway to
forward the generated traffic log file to the Splunk server. We specified the source type and index on the
forwarder as the same source type and index we defined on the Splunk server. The server was configured
as shown in Figure 3, where port 9997 was used to receive traffic logs and port 8089 for management.
In addition, we used IPTABLES to add specific rules preventing abnormal traffic generated from
a specific IoT device and targeting certain machine.
Figure 3. outputs.conf file and deploymentclient.conf file
(d) SIEM Solution: We used the well known Splunk SIEM solution [8] to analyze IoT traffic collected
through the gateway. Splunk was installed on a standalone server and was configured to present the
collected traffic logs in a readable and searchable way. This required us to extract certain fields from the
IoT traffic logs and present it in Splunk readable format. The Splunk system represents the core of our
IoT botnet detection prototype. In this regard, collected traffic logs were parsed, indexed, and stored in a
secure database designed only for high availability and real-time analysis. Analyzing this traffic allowed
us to understand the behavior of the monitored device. Moreover, Splunk was configured to alarm the
network administrator about suspicious events and to automatically add defensive rules to the firewall in
order to block attack traffic originating from infected IoT devices.
(e) Firewall: We used IPTABLES to implement the firewall where the SIEM is configured to add specific
rules to block certain traffic types in a fully automated fashion based on the IoT traffic log analysis.
Adding/removing rules is done through an SSH connection between the SIEM and the firewal.
5. EVALUATION
The prototype implementation described in Subsection 4.2. was used to test the functionality of the
proposed system. In this prototype, IoT bots were instructed to flood a targeted system with different types
of attack packets. Then, IoT traffic logs were forwarded periodically to the Splunk server. While Splunk
platform comes with a predefined source types (e.g., syslog, apachelog, etc.), the IoT traffic log captured by
tcpdum could not be recognized by Splunk. Therefore, we defined a new source type called “tcpdump traffic”.
Defining a new source type can be done by creating a new file in the configuration folder in SIEM deployment
this file located in “$SPLUNK HOME/etc/system/local” the source type helps the SIEM server in determine
how can the server reacts with this kind of log. Also, we added a special field called stamp in each forwarded
packet such that Splunk identified the source type of the received log.
In Splunk, it is required to write specific regular expressions to extract certain packet fields from
the traffic logs. For IoT botnet detection, we instructed Splunk to extract: Source Mac address (Src MAC),
Destination Mac address (Dst MAC), Source IP address (Src IP), Destination IP address (Dst IP), Source port
(Src port), Destination port (Dst port). Figure 4 shows an example of the extracted fields from one of the
packets. For each of the attack types mentioned above, we set a threshold value for the number of packets
originating from IoT devices. Once this number exceeds the threshold value a notification email is sent to the
network administrator and a filtering rule is automatically added to the firewall to block attack traffic.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2189
Figure 4. Main packet header fields extracted by Splunk
We tested the prototype by conducting diffrent types of attacks including SYN flooding,
DNS flooding, and ICMP flooding. For example, in the case of SYN flooding attack the botmaster instructed
IoT device to flood the target machine (IP address: 10.242.232.144) with SYN packets. Figure 5 shows that
wireshark traffic capture on the two network interfaces of the Gateway side by side. Splunk alerts the adminis-
trator about this attack as shown in Figure 6 and a filtering rule is added automatically to IPTABLES in order
to block attack traffic as shown in Figure 7. Dealing with other attacks was done in a similar way.
Figure 5. A Wireshark traffic capture of SYN flooding attack traffic from Internet side and IoT network side
Figure 6. A Splunk generated email alert about ongoing SYN flooding attack
Figure 7. A filtering rule is added automatically to iptables in order to block attack traffic
6. CONCLUSIONS
With the rapid adoption of IoT devices in our daily life, there is a growing concern from exploiting
vulnerabilities of these devices to form IoT botnets and perform different types of attacks. DDoS attacks
originating from IoT botnets represent an imminent threat for today’s Internet because of the attackers ability
SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
2190 Ì ISSN: 2088-8708
to generate high packet volume from millions of compromised IoT devices. In this paper, we proposed a SIEM
based system to detect and mitigate this type of attacks. The proposed system detects and blocks DDoS attack
traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and
DNS packets originating from these devices. Also, We discussed a prototype implementation of the proposed
system showing how the SIEM based solutions can be configured to accurately identify and block malicious
traffic originating from compromised IoT devices. In addition, we discussed recent advances in the field of
IoT botnets focusing mainly on main methods to discover IoT devices’ vulnerabilities and main approaches to
detect IoT botnets.
REFERENCES
[1] H. Lin and N. Bergmann. IoT privacy and security challenges for smart home environments. Information,
7(3):44, 2016.
[2] S. Baker, W. Xiang, and I. Atkinson. Internet of things for smart health care: Technologies, challenges,
and opportunities. IEEE Access, 5:26521–26544, 2017.
[3] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson. The industrial internet of things (iiot): An analysis
framework. Computers in Industry, 101:1–12, 2018.
[4] S. Cha, S. Baek, S. Kang, and S. Kim. Security evaluation framework for military iot devices. Security
and Communication Networks, 2018, 2018.
[5] IoT: number of connected devices worldwide 2012-2025 — statista.
https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. (Accessed
on 03/09/2019).
[6] K. Angrishi. Turning Internet of things into Internet of vulnerabilities (IovV: IoI botnets. arXiv preprint
arXiv:1702.03681, 2017.
[7] 2016 dyn cyberattack - wikipedia. https://en.wikipedia.org/wiki/2016 Dyn cyberattack. (Accessed on
03/09/2019).
[8] Splunk SIEM solution, https://www.splunk.com/. (Accessed on 09/18/2019)
[9] Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, and Peng Liu. The effect of iot new features on security
and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things
Journal, 2018.
[10] E. Fernandes, J. Jung and A. Prakash. Security Analysis of Emerging Smart Home Applications. In 2016
IEEE Symposium on Security and Privacy (SP), pages 636–654. IEEE, 2016.
[11] Y. .M Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow. IoTPOT: Analyzing the
Rise of IoT Compromises. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015.
[12] E. Ronen, A. Shamir, A. Weingarten, and C. O’Flynn. IoI Goes Nuclear: Creating a Zigbee Chain
Reaction. In 2017 IEEE Symposium on Security and Privacy (SP), pages 195–212. IEEE, 2017.
[13] A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. A Large-Scale Analysis of the Security of Em-
bedded Firmwares. In 23rd {USENIX} Security Symposium ({USENIX} Security 14), pages 95–110,
2014.
[14] E. Fernandes, J. Jung, and A. Prakash. Security Analysis of Emerging Smart Home Applications. In 2016
IEEE Symposium on Security and Privacy (SP), pages 636–654. IEEE, 2016.
[15] H. Kim, T. Kim, and D. Jang. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discov-
ery of Vulnerable IoT Devices. Symmetry, 10(5):151, 2018.
[16] Z. Durumeric, M. Bailey, and J. A. Halderman. An Internet-Wide view of Internet-Wide Scanning. In
Proceedings of the 23rd USENIX Conference on Security Symposium, SEC’14, pages 65–78, Berkeley,
CA, USA, 2014. USENIX Association.
[17] J. Luo, C. Shan, J. Cai, and Y. Liu. IoT Application-Layer Protocol Vulnerability Detection Using Reverse
Engineering. Symmetry, 10(11):561, 2018.
[18] Y. Jia, Y. Xiao, J. Yu, X. Cheng, Z. Liang, and Z. Wan. A Novel Graph-based Mechanism for Identifying
Traffic Vulnerabilities in Smart Home IoT. In IEEE INFOCOM 2018-IEEE Conference on Computer
Communications, pages 1493–1501. IEEE, 2018.
[19] H. Li, Y. He, L. Sun, X. Cheng, and J. Yu. Side-Channel Information Leakage of Encrypted Video
Stream in Video Surveillance Systems. In IEEE INFOCOM 2016-The 35th Annual IEEE International
Conference on Computer Communications, pages 1–9. IEEE, 2016.
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2191
[20] N. Apthorpe, D. Reisman, and Nick Feamster. A Smart Home is no Castle: Privacy Vulnerabilities of
Encrypted IoT Traffic. arXiv preprint arXiv:1705.06805, 2017.
[21] D. Summerville, K. M. Zach, and Y. Chen. Ultra-Lightweight Deep packet Anomaly Detection for Inter-
net of Things Devices. In 2015 IEEE 34th International Performance Computing and Communications
Conference (IPCCC), pages 1–8, Dec 2015.
[22] G. Sagirlar, B. Carminati, and E. Ferrari. Autobotcatcher: Blockchain-based P2P Botnet Detection for
the Internet of Things. CoRR, abs/1809.10775, 2018.
[23] V. Blondel, J. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks.
Journal of Statistical Mechanics: Theory and Experiment, 2008(10):P10008, oct 2008.
[24] P. Ioulianou, V. Vasilakis, I. Moscholios, and M. Logothetis. A Signature-based Intrusion Detection
System for the Internet of Things. 2018.
[25] H. R. Shahriari and E. Khoshhalpour. Botrevealer: Behavioral Detection of Botnets based on Botnet
Life-Cycle. The ISC International Journal of Information Security, 10(1):55–61, 2018.
[26] L. De Carli, R. Torres, G. Modelo-Howard, A. Tongaonkar, and S. Jha. Botnet Protocol Inference in the
Presence of Encrypted Traffic. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communica-
tions, pages 1–9, May 2017.
[27] A. O. Prokofiev, Y. S. Smirnova, and V. A. Surov. A Method to Detect Internet of Things Botnets. In 2018
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus),
pages 105–108, Jan 2018.
[28] H. Sedjelmaci, S. M. Senouci, and M. Al-Bahri. A Lightweight Anomaly Detection Technique for Low-
Resource IoT Devices: A Game-Theoretic Methodology. In 2016 IEEE International Conference on
Communications (ICC), pages 1–6, May 2016.
[29] H. Bostani and M. Sheikhan. Hybrid of Anomaly-based and Specification-based IDS for Internet of
Things Using Unsupervised OPF based on MapReduce Approach. Computer Communications, 98:52–
71, jan 2017.
[30] D. S. Lavrova, “An approach to developing the SIEM system for the Internet of Things,” Automatic
Control and Computer Sciences, vol. 50, no. 8, pp. 673–681, 2016.
[31] P. Zegzhda, D. Zegzhda, M. Kalinin, A. Pechenkin, A. Minin, and D. Lavrova, “Safe integration of SIEM
systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing,” in
Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016, pp.
81–87, USA, July 2016.
SIEM-based detection and mitigation of... (Basheer Al-Duwairi)

More Related Content

PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
PDF
Unauthorized Access Detection in IoT using Canary Token Algorithm
PDF
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PDF
Hacking Internet of Things (IoT)
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PPTX
Internet of things
PDF
Security Architecture for Small Branch and IoT
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Unauthorized Access Detection in IoT using Canary Token Algorithm
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
A survey on Internet of Things (IoT) security : Challenges and Current status
Hacking Internet of Things (IoT)
IRJET - Cyber Security Threats and Vulnerabilities in IoT
Internet of things
Security Architecture for Small Branch and IoT

What's hot (20)

PDF
Review on Vulnerabilities of IoT Security
PDF
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
PDF
Security in IoT
PDF
Safeguarding the Internet of Things
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
DOCX
Chapter 3.docx
PPTX
Privacy and security in IoT
PDF
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
PDF
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
DOCX
Security and Privacy considerations in Internet of Things
PDF
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
PDF
IoT, Security & the Path to a Solution
PDF
Security 2 Q 07[1]
PDF
Will Internet of Things (IoT) be secure enough?
PDF
Ransomware protection in loT using software defined networking
PPTX
Security in IoT
Review on Vulnerabilities of IoT Security
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Security in IoT
Safeguarding the Internet of Things
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
A survey in privacy and security in Internet of Things IOT
Malware threat analysis techniques and approaches for IoT applications: a review
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Chapter 3.docx
Privacy and security in IoT
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Security and Privacy considerations in Internet of Things
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
IoT, Security & the Path to a Solution
Security 2 Q 07[1]
Will Internet of Things (IoT) be secure enough?
Ransomware protection in loT using software defined networking
Security in IoT
Ad

Similar to SIEM-based detection and mitigation of IoT-botnet DDoS attacks (20)

PDF
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
DOCX
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
PDF
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
PDF
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
PDF
IoT Security, Mirai Revisited
PDF
Arbor Presentation
PDF
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
PPTX
beware of Thing Bot
PDF
A Survey Report on : Security & Challenges in Internet of Things
PPTX
iot ppt.pptx
PDF
A new algorithm to enhance security against cyber threats for internet of thi...
PDF
A Review On Intrusion Detection Systems To Secure IoT Networks
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PPTX
Assign 1_8812814ctm.pptx
PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
Data Science for IoT
PDF
Using Machine Learning to Build a Classification Model for IoT Networks to De...
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
IoT Network Attack Detection using Supervised Machine Learning
Lightweight Distributed Attack Detection and Prevention for the Safe Internet...
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Detecting and Confronting Flash Attacks from IoT Botnets
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IoT Security, Mirai Revisited
Arbor Presentation
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
beware of Thing Bot
A Survey Report on : Security & Challenges in Internet of Things
iot ppt.pptx
A new algorithm to enhance security against cyber threats for internet of thi...
A Review On Intrusion Detection Systems To Secure IoT Networks
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
Assign 1_8812814ctm.pptx
October 2021: Top 10 Read Articles in Network Security and Its Applications
Data Science for IoT
Using Machine Learning to Build a Classification Model for IoT Networks to De...
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Network Attack Detection using Supervised Machine Learning
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Digital Logic Computer Design lecture notes
PPT
Mechanical Engineering MATERIALS Selection
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
PPT on Performance Review to get promotions
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Well-logging-methods_new................
PDF
composite construction of structures.pdf
PPTX
Welding lecture in detail for understanding
Sustainable Sites - Green Building Construction
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Digital Logic Computer Design lecture notes
Mechanical Engineering MATERIALS Selection
Automation-in-Manufacturing-Chapter-Introduction.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CH1 Production IntroductoryConcepts.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT on Performance Review to get promotions
Foundation to blockchain - A guide to Blockchain Tech
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
additive manufacturing of ss316l using mig welding
Well-logging-methods_new................
composite construction of structures.pdf
Welding lecture in detail for understanding

SIEM-based detection and mitigation of IoT-botnet DDoS attacks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 2, April 2020, pp. 2182∼2191 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i2.pp2182-2191 Ì 2182 SIEM-based detection and mitigation of IoT-botnet DDoS attacks Basheer Al-Duwairi, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abdelqader, Abdullah Rawash, Rana Fahmawi Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan Article Info Article history: Received Aug 10, 2019 Revised Oct 9, 2019 Accepted Oct 30, 2019 Keywords: IoT botnets Network security SIEM ABSTRACT The Internet of Things (IoT) is becoming an integral part of our daily life includ- ing health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose Secu- rity Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compro- mised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be config- ured to accurately identify and block malicious traffic originating from compromised IoT devices. Copyright c 2020 Insitute of Advanced Engineeering and Science. All rights reserved. Corresponding Author: Basheer Al-Duwairi, Jordan University of Science and Technology, Irbid 22110, Jordan. Tel: +962-02-7201000 (Ext. 24000) Email: basheer@just.edu.jo 1. INTRODUCTION Internet of things (IoT) have witnessed enormous growth in recent years. This growth is due to the significant development in semiconductor industry, wireless communication technologies and the emergence of IoT applications in different fields in our daily life including: smart homes [1], health care sector [2], industrial control systems [3] and military applications [4]. According to Statista [5], the number of IoT connected devices is estimated to be about 23.4 billion and is expected to increase to 31 billion in 2020. Motivated by the significant growth of IoT, hackers are eager to take advantage of their computation and communication capabilities to perform different types of attacks. Botnets represent the primary source of many attacks targeting the Internet. A botnet is a network of compromised machines (e.g. computers, smart- phones, IoT devices, etc.) which are controlled by an attacker (botmaster) and used to perform a variety of activities such as distributed denial of service (DDoS) attacks, spamming, click fraud, and phishing attack. IoT devices are creating a huge risk to security compared to the ordinary Internet connected devices because of their large number, resource limitation and protocol diversity, which makes IoT a valuable target for attack- ers to create IoT botnet. For example, an attacker can compromise victim’s IoT smart home devices [1] to obtain sensitive information, or to use IoT devices as IoT Botnets [6] in order to execute a distributed denial- Journal homepage: http://ijece.iaescore.com/index.php/IJECE
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2183 of-service attacks (DDos) against critical cyber-physical systems. On October 21, 2016, Attackers launched a DDoS attack against Dyn DNS service [7] by utilizing Mirari IoT botnet causing many services and internet platforms to be unavailable in Europe and North America. Previous research efforts have focused on devising mechanisms to detect vulnerable or compromised IoT devices or to secure IoT devices despite of their computing, storage and power limitations. IoT devices usually exchange different types of messages and generate huge amount of data making it difficult to monitor and correlate events and detect malicious activities originating from them. In this paper, we address the problem of DDoS attacks originating from IoT botnets by using Security Information and Event Management (SIEM) solution in such a way to detect and block attack traffic. The main contributions of the paper are as follows: (a) A SIEM-based IoT botnet detection system. The proposed system adopts Splunk SIEM solution [8] to identify and block traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS flooding. (b) The implementation of a prototype of an IoT botnet detection system based on the proposed Security Information and Event Management (SIEM) solution, and application of the proposed system to detect three common DDoS attack types. (c) Review of different aspects of IoT botnets focusing mainly on IoT botnet architectures, main types, countermeasures, and discusses recent research efforts in this field. The rest of this paper is organized as follows: background information about IoT botnets and presents main features and limitations of IoT devices are presented in Section 2. Related work is discussed in Section 3. The proposed system and the prototype implementation of the SIEM-based IoT Botnet DDoS attack detec- tion and mitigation is discussed in Section 4. Evaluation of the proposed system is presented in Section 5. Finally, conclusions are presented in Section 6. 2. BACKGROUND ABOUT IOT BOTNETS A Botnet is a group of compromised devices that are manipulated using command and control channel to perform malicious activities. Recently, IoT botnets have emerged as a new type of botnets where hackers control millions of compromised IoT devices and utilize them in their malicious attacks. Generally, an IoT botnet consists of the following components: (a) Bots: compromised IoT devices used to perform the different types of attacks (e.g., denial of service). (b) Command and Control Server: Server used to control the Bots. (c) Scanners: used to scan for vulnerable IoT devices. (d) Reporting Server: Server used to collect scanning reports from scanner or Bots. (e) Loader: instruct IoT devices to download the malware code after logging at the vulnerable IoT devices. (f) Malware Distribution Server: A server responsible for malware distribution. IoT devices have been widely utilized in many large-scale DDoS attacks. In these attacks, IoT devices are instructed by the botmaster to flood a target system with huge amount of packets (e.g. SYN, DNS, ICMP, etc.). Zhou et al [9], discussed several features of IoT devices that contributes to the problem of IoT botnets. These features include: (a) Constrained Compared to traditional PCs and mobile devices, IoT devices usually have limited compu- tational capabilities and storage resources due to cost and physical conditions constraints. For example, IoT devices used in a military environment have to work for a long time on battery. Therefore, power-consuming applications can not run on such devices. On the other hand, IoT devices used in the medical sector are time- constrained. Therefore, time-consuming applications can not run on such devices in order to avoid delay in the response. Because of such limitations, we cannot deploy the required defense systems on these devices such as complex encryption and authentication techniques that consume computing and storage resources, and thus create many vulnerabilities that can be exploited by hackers. (b) Diversity IoT technology is increasingly used in many real life applications. As a result, there are many IoT vendors with large number of heterogeneous IoT products that have their own network and communication protocol implementations. In most cases, many of these products do not have security included in their design . According to HP report in 2015, 80% of IoT devices are working with a default password, 70% are not using encryption during communication and 60% of IoT devices have weak web interface and are not updated [10]. On the other hand, different IoT companies may develop different communication protocols which may result in vulnerabilities that could be exploited by adversaries. SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
  • 3. 2184 Ì ISSN: 2088-8708 (c) Myriad This feature describes the increasing number of IoT devices and the data generated by them. Due to the lack of security in IoT devices, and because of the power and computing limitations, this will create an army of IoT zombie that could be exploited in many attacks such as DDoS attacks. Yin et al [11] found that most large-scale DDoS attacks caused by IoT devices, he proved this by using honey bot and sand box to collect attack samples of IoT devices. (d) Unattended This feature is related to IoT devices that work for a long period of time without physical access to verify the state of these devices or to detect if it has been attacked. Ronen et al [12] implemented an attack on Philips’s smart light bulb by exploiting vulnerability in the protocol and show how fast the developed worm will spread over the other bulbs. (e) Mobility Many IoT devices (e.g., wearable devices) will have to hop from one network to another and communicate with different devices according to the human movement. This mobility feature of IoT devices gives hackers better chances to compromise mobile IoT devices. 3. RELATED WORK There have been substantial amount of work about IoT security. In this section, we provide a review of the recent advances in this field focusing on detecting IoT devices vulnerabilities, detecting IoT network vulnerabilities, and detecting IoT botnets. 3.1. Detecting IoT devices’ vulnerabilities IoT devices’ vulnerabilities can be detected by making static analysis of their frameworks. For example, Ronen et al. [12] described a threat in which IoT devices can rapidly infect each other by any newly developed malware. They prove this by exploiting a vulnerability in the implementation part of Zigbee light protocol of Philips Hue smart lamps to perform a remotely firm-ware update. Then they perform side channel attack to extract the key used by Philips smart lamps to encrypt and authenticate the update. After that, the worm rapidly spread from the infected lamp to the other lamps using their ZigBee wireless connectivity. Such attack enables an attacker to control city lighting or to exploit the lamps in DDoS attacks. Costin et al. [13] performed a large-scale security analysis of 32 thousand of firmware images of embedded devices, and found 38 unknown vulnerabilities in more than 693 firmware images which extend in 123 different products. Fernandes et al. [14] performed static source code analysis and crafted tests on 123 smart Home platforms and 499 smart things applications. They discovered two flaws in the design of these platforms. These design flaws lead to grant Smart Things Application over privileged rather than a separated privilege as designed, beside the full access of these applications to the Smart Home Device rather than the limited access as designed. They also proved that the asynchronous communication (event subsystem) between devices and Smart Applications is not secure and could leak sensitive information. Several research efforts have been made to develop Internet Wide Scan technologies to search for vulnerable IoT devices. Kim et al [15] proposed a model to improve the performance of the Internet Wide Scanner Zmap [16]. This model consists of three modules:1. IP alive scan which collect IoT device status information.2. Reactive Protocol scan which collect network and service information.3. OS fingerprinting scan which collect operating system information. The proposed model showed an improvement in the result compared with Zmap. Although the scanning throughput was similar to Zmap in IP alive scanning but it was 118% better in generating IP addresses that were not filtered by security devices. Port scanning also showed 129% better performance compared to Censys based on ZMap and the Operating system identification showed 50% better identification accuracy compared with 10-20% for Zmap using exact matching technique. 3.2. Detecting IoT network vulnerabilities There are several approaches for detecting IoT network vulnerabilities. These approaches can be classified into fuzzing-based techniques, graph-based analysis, and network traffic pattern-baed analysis. 3.2.1. Fuzzing based Fuzzing is a security technique used to detect vulnerability in network protocol by sending test files with false data to a software implementing the tested protocol, and then observe resulting software exceptions to detect the vulnerabilities. There are two kinds of Fuzzing techniques:1. Mutation based: test files generated by injecting random and false data in sample messages. 2: Generating based: test files generate by constructing messages with random and false data based on specific protocol specifications. The main problem of this Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2185 method is that the number of test files is large and consume a lot of time and many of these test files do not follow the rules of message format of many protocols. Luo et al [17], proposed a technique based on protocol reverse engineering, to identify the message format of protocols and create test file messages with certain faults according to the message format. This method reduces the size of test files for Fuzzing. They proposed an algorithm to detect multi-change-point of the message fields, then classifying it into keyword fields, data fields and uncertain fields by employing a probability test. 3.2.2. Graph-based analysis Jia et al [18] verified the effectiveness graph-based analysis on a smart home system consisting of Google home speaker, smart light pulp and smartphone. Using captured files as input to construct the traffic graph, they were able to identify the correlated sub-graphs and the vulnerabilities based on the sensitivity level of different keywords. In their experiment, they analyzed 58,714 collected messages and found 6 vulnerable sub-graphs that they exploited to launch 6 attacks. 3.2.3. Network traffic pattern-based analysis It has been shown that the attacker could infer user’s information by analyzing the traffic size and rate even in case the traffic is encrypted. Li1 et al [19] analyzed the traffic of encrypted video stream for Video Surveillance Systems and observed that the traffic pattern is different at different user activity, showing that there is a side-channel information leakage even the video stream is encrypted. Apthorpe et al [20] examined the network traffic rate of several IoT devices and found that passive network observers, could analyze the network traffic and infer sensitive information. 3.3. Detecting IoT botnets Different approaches used to detect IoT botnet at different steps of botnet life cycle. The approaches used to detect IoT botnet are discussed in the following subsections. 3.3.1. Anomaly-based This approach detects IoT botnet by recognizing malicious behavior in the network; this approach requires storing previous profile for the normal behavior for the network. Summerville et al, [21] developed an ultralight packet anomaly-based method to detect abnormal payload in the packet, using efficient matching technique for bit pattern requires only ADD operation followed by incremental counter, and implemented as a look up table for fast and flexible packet evaluation. Sagirlar et al, [22] proposed Auto Bot catcher, which utilizes Block chain concept to detect decentralized P2P Botnets. The design of AutoBotCatcher is driven by the concept that bots in the same botnets usually communicate with each other and form a community, so it will detect the community by analyzing the network traffic between IoT devices and then detect the botnet. AutoBotCatcher consists of two main actors: agents and block generator. The agent is responsible for monitoring the network traffic between IoT devices, and sending the collected information as a block chain transaction to a big trusted entity in the network (block generator), which will model mutual contact information of IoT device and create mutual contact graph, and then use Louvain method [23] to detect community based on the graph. 3.3.2. Signature-based This approach detects the IoT botnet based on the signature of the botnet stored in the database of the system. P. Ioulianou et al [24] proposed a solution that depends on Intrusion Detection System (IDS), which is a security technology used to monitor networks for any malicious activity or policy violation. They place these IDS modules in a hybrid mode. The detection and firewall module called Router IDS and the monitoring lightweight module called Detector IDS. These modules are distributed in the network close to IoT devices, and this does not require any software modification on sensors or devices. Detector IDS logs network traffic and sends it to the Router IDS that will detect malicious node behavior if it resembles to a known attack. Khoshhalpour et al, [25] proposed a host-based approach called BotRevealer to detect IoT botnet in the early infection step, using botnet life cycle as a general signature for detection. They analyze the running process and network activities on the host based on statistical features of packet sequence and compare it with the behavior pattern of botnet traffic. SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
  • 5. 2186 Ì ISSN: 2088-8708 3.3.3. Specification-based This approach is similar to anomaly-based approach but it takes into account system specifications. Carli et al, [26] proposed an automatic interference technique for the specifications of malware network protocol using samples of malware communication and malware binary. Since each malware has its own custom binary format and each C&C protocol has its own malware family, this will provide a fingerprint for the malware structure and intent. They proposed a type system field of the message that describes all field types in the message, and then use type interference algorithm to interfere message structure. However, most C&C network traffic is encrypted so they apply dynamic traffic analysis to extract C&C system keys. Prokofiev et al [27] proposed a detection technique for IoT botnets during the propagation stage where infected devices starts to exploit other devices in the network using brute-force attack using telnet and/or ssh protocols. They build a logistic regression model based on the Request Parameters and Specification such as: (Destination Port, even number of requests and alphanumeric) to estimate IoT bot. initiates the probability that the connection initiated to a device. They build the model using the data collected from 100 IoT Botnets. 3.3.4. Hybrid-based This approach combines two approaches together, anomaly-based and signature-based techniques or anomaly-based and specification-based techniques, to detects the IoT botnet with high detection and low false positive rate. Sedjelmaci et al [28] proposed a low energy consumption anomaly and signature based, to detect attacks effectively using the proposed Game Theory to model the security strategy as a game formula between the attacks and the IDS agent in the IoT device, and use Nash equilibrium to determine the equilibrium state that will allow the IDS agent to activate the anomaly detection technique only when the attack signature is expected to happen, this will reduce the power consumption in IoT device due to anomaly detection techniques and increase the detection accuracy. In the other hand, Bostani et al [29] proposed anomaly-based and specification- based intrusion detection models to detect attacks in IoT. The specification-based detection agent will be located on routers nodes; it will analyze the host node behaviour and send the results to the root node where the anomaly-based detection agent is located. This agent based on the Map reduce architecture will employ optimum path algorithm using the data sent by routers nodes to project clustering model and detect malicious behaviour using voting mechanism. 4. PROPOSED WORK: SIEM-BASED DETECTION AND MITIGATION OF IOT BOTNET DDOS ATTACKS In this section, we present the proposed SIEM-based detection and mitigation of IoT botnet DDoS attacks, focusing on the system overall architecture and a prototype implementation. 4.1. System architecture SIEM systems are primarily used in the security field to correlate events reported by various network security defense technologies (e.g., intrusion detection systems, firewalls, bring your own device solutions, operating systems syslogs, etc.) deployed within an Enterprise network. The results of event correlation indicate weather there is a security incident or no. There are few recent research studies about the use of SIEM solutions for IoT security, such in [30, 31]. These studies focused mainly on efficient delivery of IoT data to the SIEM system for analysis and correlation of events. Figure 1 depicts the basic architecture of the proposed system. First, IoT traffic logs are forwarded by the default gateway to the SIEM system. These traffic logs are obtained from various IoT devices in the monitored network including IP cameras, fingerprint readers, building management system sensors, etc. The SIEM solution performs a sequence of data processing tasks that include parsing, indexing, and storing these logs in a highly available secure database. The logs are then analyzed and in case there is any abnormal behavior compared to the traffic profile of the device in question, it detects an attack and alerts the network administrator. DDoS attacks are generally characterized by a high packet volume. Therefore, the detection of DDoS attacks in our system is based on comparing the number of packets of certain type (e.g., SYN, ICMP, or DNS) that are destined to a certain machine to a predefined threshold value. Once an attack is detected, SIEM mitigates the ongoing attack by automatically configuring the firewall application installed on the default gateway such that new rules are added to block attack traffic. There are multiple SIEM platforms that can gather machine data. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2187 Figure 1. System Architecture 4.2. Prototype implementation An enterprise network (e.g., a campus network) usually has different types of IoT devices such as IP cameras, temperature sensors, fingerprint attendance system, etc. Monitoring these devices individually would be difficult because of traffic heterogeneity. In this paper, we have implemented a prototype of an IoT botnet detection system based SIEM solution. Our goal is to show that it is possible to detect different types of malicious traffic originating from various IoT devices. A prototype implementation of the proposed systems is shown in Figure 2. Figure 2. Network topology of the IoT botnet detection prototype This prototype consists of the following main components: (a) IoT Botnet: In any organizational network, there are different types of IoT devices that are vulnerable to botnet infection. In our prototype, we represented the IoT botnet by Raspberry Pi v1 which is an open source hardware platform that can be used for special purpose IoT devices. We installed a bot code written in Python scripting language on these devices to generate different types of attack traffic that include SYN flooding, DNS flooding, and ICMP flooding. In addition, we used a Cisco 2520V camera with framework Cisco Video Surveillance 2421 IP Dome camera in order to generate background IoT traffic. Bots receive commands in the format: (b) (type, count, IP, data), where type represent attack packet type (e.g., SYN, DNS, or ICMP), count specifies the number of packets to be sent in case of flooding attacks, IP represents the IP address of the targeted system, and data specifies the port number if in case of SYN flooding attack, or the domain in case of DNS attack, not used in ping scan. Each bot runs a Python script to conduct the attack based on the parameters assigned in the command received from the botmaster. (c) Gateway: We configured a Linux machine to work as the default gateway of the IoT devices. The machine has two network interfaces. One Interface is facing the Internet and the other one is facing SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
  • 7. 2188 Ì ISSN: 2088-8708 the local network where IoT devices are located. We run tcpdum on this machine in order to capture IoT traffic. We used the command: bash tcpdump– − n– − e– − iinterface” > logfile.log to capture all outgoing traffic and saving it in a logfile to be forwarded to Splunk server periodically. Here we used the options -n and -e in order not to convert the IP address and to include MAC addresses in the traffic capture, respectively. We installed and configured the Splunk forwarder on the gateway to forward the generated traffic log file to the Splunk server. We specified the source type and index on the forwarder as the same source type and index we defined on the Splunk server. The server was configured as shown in Figure 3, where port 9997 was used to receive traffic logs and port 8089 for management. In addition, we used IPTABLES to add specific rules preventing abnormal traffic generated from a specific IoT device and targeting certain machine. Figure 3. outputs.conf file and deploymentclient.conf file (d) SIEM Solution: We used the well known Splunk SIEM solution [8] to analyze IoT traffic collected through the gateway. Splunk was installed on a standalone server and was configured to present the collected traffic logs in a readable and searchable way. This required us to extract certain fields from the IoT traffic logs and present it in Splunk readable format. The Splunk system represents the core of our IoT botnet detection prototype. In this regard, collected traffic logs were parsed, indexed, and stored in a secure database designed only for high availability and real-time analysis. Analyzing this traffic allowed us to understand the behavior of the monitored device. Moreover, Splunk was configured to alarm the network administrator about suspicious events and to automatically add defensive rules to the firewall in order to block attack traffic originating from infected IoT devices. (e) Firewall: We used IPTABLES to implement the firewall where the SIEM is configured to add specific rules to block certain traffic types in a fully automated fashion based on the IoT traffic log analysis. Adding/removing rules is done through an SSH connection between the SIEM and the firewal. 5. EVALUATION The prototype implementation described in Subsection 4.2. was used to test the functionality of the proposed system. In this prototype, IoT bots were instructed to flood a targeted system with different types of attack packets. Then, IoT traffic logs were forwarded periodically to the Splunk server. While Splunk platform comes with a predefined source types (e.g., syslog, apachelog, etc.), the IoT traffic log captured by tcpdum could not be recognized by Splunk. Therefore, we defined a new source type called “tcpdump traffic”. Defining a new source type can be done by creating a new file in the configuration folder in SIEM deployment this file located in “$SPLUNK HOME/etc/system/local” the source type helps the SIEM server in determine how can the server reacts with this kind of log. Also, we added a special field called stamp in each forwarded packet such that Splunk identified the source type of the received log. In Splunk, it is required to write specific regular expressions to extract certain packet fields from the traffic logs. For IoT botnet detection, we instructed Splunk to extract: Source Mac address (Src MAC), Destination Mac address (Dst MAC), Source IP address (Src IP), Destination IP address (Dst IP), Source port (Src port), Destination port (Dst port). Figure 4 shows an example of the extracted fields from one of the packets. For each of the attack types mentioned above, we set a threshold value for the number of packets originating from IoT devices. Once this number exceeds the threshold value a notification email is sent to the network administrator and a filtering rule is automatically added to the firewall to block attack traffic. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2189 Figure 4. Main packet header fields extracted by Splunk We tested the prototype by conducting diffrent types of attacks including SYN flooding, DNS flooding, and ICMP flooding. For example, in the case of SYN flooding attack the botmaster instructed IoT device to flood the target machine (IP address: 10.242.232.144) with SYN packets. Figure 5 shows that wireshark traffic capture on the two network interfaces of the Gateway side by side. Splunk alerts the adminis- trator about this attack as shown in Figure 6 and a filtering rule is added automatically to IPTABLES in order to block attack traffic as shown in Figure 7. Dealing with other attacks was done in a similar way. Figure 5. A Wireshark traffic capture of SYN flooding attack traffic from Internet side and IoT network side Figure 6. A Splunk generated email alert about ongoing SYN flooding attack Figure 7. A filtering rule is added automatically to iptables in order to block attack traffic 6. CONCLUSIONS With the rapid adoption of IoT devices in our daily life, there is a growing concern from exploiting vulnerabilities of these devices to form IoT botnets and perform different types of attacks. DDoS attacks originating from IoT botnets represent an imminent threat for today’s Internet because of the attackers ability SIEM-based detection and mitigation of... (Basheer Al-Duwairi)
  • 9. 2190 Ì ISSN: 2088-8708 to generate high packet volume from millions of compromised IoT devices. In this paper, we proposed a SIEM based system to detect and mitigate this type of attacks. The proposed system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. Also, We discussed a prototype implementation of the proposed system showing how the SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices. In addition, we discussed recent advances in the field of IoT botnets focusing mainly on main methods to discover IoT devices’ vulnerabilities and main approaches to detect IoT botnets. REFERENCES [1] H. Lin and N. Bergmann. IoT privacy and security challenges for smart home environments. Information, 7(3):44, 2016. [2] S. Baker, W. Xiang, and I. Atkinson. Internet of things for smart health care: Technologies, challenges, and opportunities. IEEE Access, 5:26521–26544, 2017. [3] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson. The industrial internet of things (iiot): An analysis framework. Computers in Industry, 101:1–12, 2018. [4] S. Cha, S. Baek, S. Kang, and S. Kim. Security evaluation framework for military iot devices. Security and Communication Networks, 2018, 2018. [5] IoT: number of connected devices worldwide 2012-2025 — statista. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. (Accessed on 03/09/2019). [6] K. Angrishi. Turning Internet of things into Internet of vulnerabilities (IovV: IoI botnets. arXiv preprint arXiv:1702.03681, 2017. [7] 2016 dyn cyberattack - wikipedia. https://en.wikipedia.org/wiki/2016 Dyn cyberattack. (Accessed on 03/09/2019). [8] Splunk SIEM solution, https://www.splunk.com/. (Accessed on 09/18/2019) [9] Wei Zhou, Yan Jia, Anni Peng, Yuqing Zhang, and Peng Liu. The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal, 2018. [10] E. Fernandes, J. Jung and A. Prakash. Security Analysis of Emerging Smart Home Applications. In 2016 IEEE Symposium on Security and Privacy (SP), pages 636–654. IEEE, 2016. [11] Y. .M Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow. IoTPOT: Analyzing the Rise of IoT Compromises. In 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015. [12] E. Ronen, A. Shamir, A. Weingarten, and C. O’Flynn. IoI Goes Nuclear: Creating a Zigbee Chain Reaction. In 2017 IEEE Symposium on Security and Privacy (SP), pages 195–212. IEEE, 2017. [13] A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. A Large-Scale Analysis of the Security of Em- bedded Firmwares. In 23rd {USENIX} Security Symposium ({USENIX} Security 14), pages 95–110, 2014. [14] E. Fernandes, J. Jung, and A. Prakash. Security Analysis of Emerging Smart Home Applications. In 2016 IEEE Symposium on Security and Privacy (SP), pages 636–654. IEEE, 2016. [15] H. Kim, T. Kim, and D. Jang. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discov- ery of Vulnerable IoT Devices. Symmetry, 10(5):151, 2018. [16] Z. Durumeric, M. Bailey, and J. A. Halderman. An Internet-Wide view of Internet-Wide Scanning. In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC’14, pages 65–78, Berkeley, CA, USA, 2014. USENIX Association. [17] J. Luo, C. Shan, J. Cai, and Y. Liu. IoT Application-Layer Protocol Vulnerability Detection Using Reverse Engineering. Symmetry, 10(11):561, 2018. [18] Y. Jia, Y. Xiao, J. Yu, X. Cheng, Z. Liang, and Z. Wan. A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pages 1493–1501. IEEE, 2018. [19] H. Li, Y. He, L. Sun, X. Cheng, and J. Yu. Side-Channel Information Leakage of Encrypted Video Stream in Video Surveillance Systems. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pages 1–9. IEEE, 2016. Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2182 – 2191
  • 10. Int J Elec & Comp Eng ISSN: 2088-8708 Ì 2191 [20] N. Apthorpe, D. Reisman, and Nick Feamster. A Smart Home is no Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. arXiv preprint arXiv:1705.06805, 2017. [21] D. Summerville, K. M. Zach, and Y. Chen. Ultra-Lightweight Deep packet Anomaly Detection for Inter- net of Things Devices. In 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pages 1–8, Dec 2015. [22] G. Sagirlar, B. Carminati, and E. Ferrari. Autobotcatcher: Blockchain-based P2P Botnet Detection for the Internet of Things. CoRR, abs/1809.10775, 2018. [23] V. Blondel, J. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):P10008, oct 2008. [24] P. Ioulianou, V. Vasilakis, I. Moscholios, and M. Logothetis. A Signature-based Intrusion Detection System for the Internet of Things. 2018. [25] H. R. Shahriari and E. Khoshhalpour. Botrevealer: Behavioral Detection of Botnets based on Botnet Life-Cycle. The ISC International Journal of Information Security, 10(1):55–61, 2018. [26] L. De Carli, R. Torres, G. Modelo-Howard, A. Tongaonkar, and S. Jha. Botnet Protocol Inference in the Presence of Encrypted Traffic. In IEEE INFOCOM 2017 - IEEE Conference on Computer Communica- tions, pages 1–9, May 2017. [27] A. O. Prokofiev, Y. S. Smirnova, and V. A. Surov. A Method to Detect Internet of Things Botnets. In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pages 105–108, Jan 2018. [28] H. Sedjelmaci, S. M. Senouci, and M. Al-Bahri. A Lightweight Anomaly Detection Technique for Low- Resource IoT Devices: A Game-Theoretic Methodology. In 2016 IEEE International Conference on Communications (ICC), pages 1–6, May 2016. [29] H. Bostani and M. Sheikhan. Hybrid of Anomaly-based and Specification-based IDS for Internet of Things Using Unsupervised OPF based on MapReduce Approach. Computer Communications, 98:52– 71, jan 2017. [30] D. S. Lavrova, “An approach to developing the SIEM system for the Internet of Things,” Automatic Control and Computer Sciences, vol. 50, no. 8, pp. 673–681, 2016. [31] P. Zegzhda, D. Zegzhda, M. Kalinin, A. Pechenkin, A. Minin, and D. Lavrova, “Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing,” in Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016, pp. 81–87, USA, July 2016. SIEM-based detection and mitigation of... (Basheer Al-Duwairi)