首页> 外文会议>International Conference on Internet of Things >A Method to Secure IoT Devices Against Botnet Attacks
【24h】

A Method to Secure IoT Devices Against Botnet Attacks

机译:一种方法来保护IOT设备对僵尸网络攻击

获取原文

摘要

An unsecured or weak authentication system between an IoT device and a user provides opportunities to attackers to manipulate and use the IoT device as botnet. The proliferation of IoT devices with an unsecured/weak authentication mechanism has increased the threat of using a huge number of IoT devices as botnets for large-scale DDoS attacks. Default credential pairs (like 'root-root' or 'admin-admin') for the Telnet or SSH connections are still part of a large group of IoT products, and many malwares have exploited this vulnerability to capture a large number of IoT devices and use them as botnets. In the recent past, Mirai malware had infected roughly a million IoT devices at its peak by brute-forcing just 62 pairs of default credentials. In this paper, we present a concept called 'login puzzle' to prevent capture of IoT devices in a large scale. Login puzzle is a variant of client puzzle, which presents a puzzle to the remote device during the login process to prevent unrestricted log-in attempts. Login puzzle is a set of multiple mini puzzles with a variable complexity, which the remote device is required to solve before logging into any IoT device. Every unsuccessful log-in attempt increases the complexity of solving the login puzzle for the next attempt. In this paper, we have introduced a novel mechanism to change the complexity of puzzle after every unsuccessful login attempt. If each IoT device had used login puzzle, Mirai attack would have required almost two months to acquire devices, while it acquired them in 20 h.
机译:IOT设备和用户之间的不安全或弱的身份验证系统为攻击者提供机会来操纵和使用IOT设备作为僵尸网络。具有不安全/弱认证机制的IOT设备的增殖增加了使用大量IOT设备作为大型DDOS攻击的僵尸网络的威胁。用于Telnet或SSH连接的“root-root”或'admin-admin')的默认凭据对仍然是一大群IOT产品的一部分,许多恶魔都利用了这种漏洞来捕获大量IoT设备和用它们作为僵尸网络。在最近的过去,Mirai恶意软件通过Brute-Foring仅为62对默认凭据感染了大约一百万个IOT设备。在本文中,我们提出了一个名为“登录拼图”的概念,以防止以大规模捕获物联网设备。登录拼图是客户端拼图的变体,在登录过程中呈现出远程设备的拼图,以防止不受限制的登录尝试。登录拼图是一组具有可变复杂性的多个迷你拼图,在登录任何IOT设备之前,需要解决远程设备。每次失败的登录都会增加解决登录拼图的复杂性以便下次尝试。在本文中,我们介绍了一种新的机制,以改变拼图的复杂性在每次不成功的登录尝试后。如果每个物联网设备使用登录拼图,Mirai攻击将需要几乎两个月的时间才能获得设备,同时在20小时内获得它们。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号