Analyzing Endpoints in the Internet of Things Malware

02/10/2019
by   Jinchun Choi, et al.
0

The lack of security measures in the Internet of Things (IoT) devices and their persistent online connectivity give adversaries an opportunity to target them or abuse them as intermediary targets for larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware with a focus on endpoints to understand the affinity between the dropzones and their target IP addresses, and to understand the different patterns among them. Towards this goal, we reverse-engineer 2,423 IoT malware samples to obtain IP addresses. We further augment additional information about the endpoints from Internet-wide scanners, including Shodan and Censys. We then perform a deep data-driven analysis of the dropzones and their target IP addresses and further examine the attack surface of the target device space.

READ FULL TEXT

page 1

page 2

research
03/26/2021

Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

The lack of security measures among the Internet of Things (IoT) devices...
research
01/28/2023

Harnessing the Power of Decision Trees to Detect IoT Malware

Due to its simple installation and connectivity, the Internet of Things ...
research
07/22/2020

An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective

In this Chapter, a software-defined network (SDN)-based framework for fu...
research
03/12/2018

A Privacy Scheme for Monitoring Devices in the Internet of Things

Sufficiently strong security and privacy mechanisms are prerequisite to ...
research
01/27/2022

A TOCTOU Attack on DICE Attestation

A major security challenge for modern Internet of Things (IoT) deploymen...
research
06/06/2022

Data-Driven Model for Failure Analysis of Internet of Things Devices: A Preliminary Study

This paper proposes the preliminary study of the data-driven failure ana...
research
03/03/2022

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware

Consumer IoT devices may suffer malware attacks, and be recruited into b...

Please sign up or login with your details

Forgot password? Click here to reset