Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations

被引:0
|
作者
Neshenko, Nataliia [1 ]
Husak, Martin [1 ,2 ]
Bou-Harb, Elias [1 ]
Celeda, Pavel [2 ]
Al-Mulla, Sameera [3 ]
Fachkha, Claude [3 ]
机构
[1] Florida Atlantic Univ, Cyber Threat Intelligence Lab, Boca Raton, FL 33431 USA
[2] Masaryk Univ, Inst Comp Sci, Brno, Czech Republic
[3] Univ Dubai, Dubai, U Arab Emirates
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While the security issue associated with the Internet-of-Things (IoT) continues to attract significant attention from the research and operational communities, the visibility of IoT security-related data hinders the prompt inference and remediation of IoT maliciousness. In an effort to address the IoT security problem at large, in this work, we extend passive monitoring and measurements by investigating network telescope data to infer and analyze malicious activities generated by compromised IoT devices deployed in various domains. Explicitly, we develop a data-driven approach to pinpoint exploited IoT devices, investigate and differentiate their illicit actions, and examine their hosting environments. More importantly, we conduct discussions with various entities to obtain IP allocation information, which further allows us to attribute IoT exploitations per business sector (i.e., education, financial, manufacturing, etc.). Our analysis draws upon 1.2 TB of darknet data that was collected from a /8 network telescope for a 1 day period. The outcome signifies an alarming number of compromised IoT devices. Notably, around 940 of them fell victims of DDoS attacks, while 55,000 IoT nodes were shown to be compromised, aggressively probing Internet-wide hosts. Additionally, we inferred alarming IoT exploitations in various critical sectors such as the manufacturing, financial and healthcare realms.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A First Empirical Look on Internet-scale Exploitations of IoT Devices
    Galluscio, Mario
    Neshenko, Nataliia
    Bou-Harb, Elias
    Huang, Yongliang
    Ghani, Nasir
    Crichigno, Jorge
    Kaddoum, Georges
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [2] Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations
    Rammouz, Veronica
    Khoury, Joseph
    Klisura, Dorde
    Pour, Morteza Safaei
    Pour, Mostafa Safaei
    Fachkha, Claude
    Bou-Harb, Elias
    [J]. 2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 206 - 211
  • [3] Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
    Neshenko, Nataliia
    Bou-Harb, Elias
    Crichigno, Jorge
    Kaddoum, Georges
    Ghani, Nasir
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2702 - 2733
  • [4] Internet-scale network intelligence
    Aparicio, M
    [J]. IEEE INTERNET COMPUTING, 1999, 3 (05) : 38 - 40
  • [5] Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices
    Shaikh, Farooq
    Bou-Harb, Elias
    Neshenko, Nataliia
    Wright, Andrea P.
    Ghani, Nasir
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (09) : 170 - 177
  • [6] Inferring, Characterizing, and Investigating Internet-Scale Malicious IoT Device Activities: A Network Telescope Perspective
    Torabi, Sadegh
    Bou-Harb, Elias
    Assi, Chadi
    Galluscio, Mario
    Boukhtouta, Amine
    Debbabi, Mourad
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 562 - 573
  • [7] Statistical structures for Internet-scale data management
    Nikos Ntarmos
    Peter Triantafillou
    Gerhard Weikum
    [J]. The VLDB Journal, 2009, 18 : 1279 - 1312
  • [8] Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data
    You, Jianzhou
    Lv, Shichao
    Hao, Yichen
    Feng, Xuan
    Zhou, Ming
    Sun, Limin
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 71 - 88
  • [9] Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace
    Yan, Zhaoteng
    Li, Zhi
    Li, Hong
    Yang, Shouguo
    Zhu, Hongsong
    Sun, Limin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3890 - 3909
  • [10] Statistical structures for Internet-scale data management
    Ntarmos, Nikos
    Triantafillou, Peter
    Weikum, Gerhard
    [J]. VLDB JOURNAL, 2009, 18 (06): : 1279 - 1312