Along with the proliferation of IoT (Internet of Things) devices, cyberattacks towards these devices are on the rise. In this paper, we present a study on applying Association Rule Learning (ARL) to discover the regularities of these attacks from the big stream data collected on a large scale darknet. By exploring the regularities in IoT-related indicators such as destination ports, type of service (ToS), and TCP window sizes, we succeeded in discovering the activities of attacking hosts associated with well-known classes of malware programs. As a case study, we report an interesting observation of the attack campaigns before and after the first source code release of the well-known IoT malware Mirai. The experiments show that the proposed scheme is effective and efficient in early detection and tracking of activities of new malware on the Internet and hence induces a promising approach to automate and accelerate the identification and mitigation of new cyber threats.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.