...
首页> 外文期刊>Internet of Things Journal, IEEE >Exploiting the Remote Server Access Support of CoAP Protocol
【24h】

Exploiting the Remote Server Access Support of CoAP Protocol

机译:利用Coop协议的远程服务器访问支持

获取原文
获取原文并翻译 | 示例
           

摘要

The constrained application protocol (CoAP) is a specially designed Web transfer protocol for use with constrained nodes and low-power networks. The widely available CoAP implementations have failed to validate the remote CoAP clients. Each CoAP client generates a random source port number when communicating with the CoAP server. However, we observe that in such implementations it is difficult to distinguish the regular packet and the malicious packet, opening a door for a potential off-path attack. The off-path attack is considered a weak attack on a constrained network and has received a less attention from the research community. However, the consequences resulting from such an attack cannot be ignored in practice. In this article, we exploit the combination of IP spoofing vulnerability and the remote server access support of CoAP is to be launch an off-path attack. The attacker injects a fake request message to change the credentials of the 6LoWPAN smart door keypad lock system. This creates a request spoofing vulnerability in CoAP, and the attacker exploits this vulnerability to gain full access to the system. Through our implementation, we demonstrated the feasibility of the attack scenario on the 6LoWPAN-CoAP network using smart door keypad lock. We proposed a machine learning (ML)-based approach to mitigate such attacks. To the best of our knowledge, we believe that this is the first article to analyze the remote CoAP server access support and request spoofing vulnerability of CoAP to launch an off-path attack and demonstrate how an ML-based approach can be deployed to prevent such attacks.
机译:受约束的应用协议(CAAP)是一种专门设计的Web传输协议,用于有限的节点和低功率网络。广泛可用的COAP实现未能验证远程COAP客户端。每个Coop客户端在与Coop Server通信时生成随机源端口号。然而,我们观察到,在这样的实施中,难以区分常规包和恶意数据包,为电位的离路径攻击开门。离路径攻击被认为是对受限制网络的弱势攻击,并从研究界感到不那么关注。但是,在实践中不能忽视这种攻击所产生的后果。在本文中,我们利用IP欺骗漏洞的组合,并且远程服务器访问支持CAAP将启动偏离路径攻击。攻击者注入假请求消息以更改6LOWPAN智能门键盘锁系统的凭据。这在Coop中创建了欺骗漏洞漏洞,并且攻击者利用此漏洞来获得对系统的完全访问权限。通过我们的实施,我们展示了使用智能门键盘锁定的6LOWPAN-COAP网络的攻击场景的可行性。我们提出了一种机器学习(ML)的方法来缓解此类攻击。据我们所知,我们认为这是第一篇分析远程CAAP服务器访问支持的文章,并请求欺骗浪费漏洞,以启动离路径攻击,并展示如何部署基于ML的方法以防止基于毫升的方法攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号