【24h】

A Method to Secure IoT Devices Against Botnet Attacks

机译:一种保护物联网设备免受僵尸网络攻击的方法

获取原文

摘要

An unsecured or weak authentication system between an IoT device and a user provides opportunities to attackers to manipulate and use the IoT device as botnet. The proliferation of IoT devices with an unsecured/weak authentication mechanism has increased the threat of using a huge number of IoT devices as botnets for large-scale DDoS attacks. Default credential pairs (like 'root-root' or 'admin-admin') for the Telnet or SSH connections are still part of a large group of IoT products, and many malwares have exploited this vulnerability to capture a large number of IoT devices and use them as botnets. In the recent past, Mirai malware had infected roughly a million IoT devices at its peak by brute-forcing just 62 pairs of default credentials. In this paper, we present a concept called 'login puzzle' to prevent capture of IoT devices in a large scale. Login puzzle is a variant of client puzzle, which presents a puzzle to the remote device during the login process to prevent unrestricted log-in attempts. Login puzzle is a set of multiple mini puzzles with a variable complexity, which the remote device is required to solve before logging into any IoT device. Every unsuccessful log-in attempt increases the complexity of solving the login puzzle for the next attempt. In this paper, we have introduced a novel mechanism to change the complexity of puzzle after every unsuccessful login attempt. If each IoT device had used login puzzle, Mirai attack would have required almost two months to acquire devices, while it acquired them in 20 h.
机译:IoT设备和用户之间的不安全或弱认证系统为攻击者提供了机会来操纵和使用IoT设备作为僵尸网络。具有不安全/弱认证机制的物联网设备的激增,增加了将大量物联网设备用作僵尸网络进行大规模DDoS攻击的威胁。 Telnet或SSH连接的默认凭据对(例如“ root-root”或“ admin-admin”)仍然是大量IoT产品的一部分,并且许多恶意软件已利用此漏洞捕获了大量IoT设备,并且将它们用作僵尸网络。在最近的过去,Mirai恶意软件仅通过强行强制执行62对默认凭据,已感染了大约一百万个IoT设备。在本文中,我们提出了一个称为“登录难题”的概念,以防止大规模捕获物联网设备。登录难题是客户端难题的一种变体,它在登录过程中向远程设备提出难题,以防止无限制的登录尝试。登录难题是一组复杂程度可变的多个微型难题,需要远程设备在登录任何IoT设备之前解决这些难题。每次失败的登录尝试都会增加解决下一次尝试的登录难题的复杂性。在本文中,我们介绍了一种新颖的机制,可以在每次尝试登录失败后更改拼图的复杂性。如果每个物联网设备都使用了登录谜题,那么Mirai攻击将需要近两个月的时间来获取设备,而它在20小时内就可以获取它们。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号