首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective
【24h】

Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective

机译:推断,表征和调查Internet规模的恶意IoT设备活动:网络望远镜的角度

获取原文

摘要

Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this paper, we address the lack of IoT-specific empirical data by drawing upon more than 5TB of passive measurements. We devise data-driven methodologies to infer compromised IoT devices and those targeted by denial of service attacks. We perform large-scale characterization analysis of their traffic, as well as explore a public threat repository and an in-house malware database, to underlie their malicious activities. The results expose a significant 26 thousand compromised IoT devices "in the wild," with 40% being active in critical infrastructure. More importantly, we uncover new, previously unreported malware variants that specifically target IoT devices. Our empirical results render a first attempt to highlight the large-scale insecurity of the IoT paradigm, while alarming about the rise of new generations of IoT-centric malware-orchestrated botnets.
机译:最近的攻击通过演示利用受Internet规模破坏的IoT设备的影响,凸显了物联网(IoT)范式的不安全性。在本文中,我们通过利用超过5TB的被动测量来解决缺乏物联网特定的经验数据的问题。我们设计了数据驱动的方法,以推断出受损的IoT设备以及那些以拒绝服务攻击为目标的设备。我们对其流量进行大规模的特征分析,并探索公共威胁存储库和内部恶意软件数据库,以作为其恶意活动的基础。结果揭示了“野外”大量的2.6万受损IoT设备,其中40%处于关键基础架构中。更重要的是,我们发现了专门针对物联网设备的新的,以前未报告的恶意软件变种。我们的经验结果是首次尝试强调物联网范式的大规模不安全性,同时警告新一代以物联网为中心的恶意软件精心策划的僵尸网络的兴起。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号