U-PoT: A Honeypot Framework for UPnP-Based IoT Devices

12/13/2018
by   Muhammad A. Hakim, et al.
0

The ubiquitous nature of the IoT devices has brought serious security implications to its users. A lot of consumer IoT devices have little to no security implementation at all, thus risking user's privacy and making them target of mass cyber-attacks. Indeed, recent outbreak of Mirai botnet and its variants have already proved the lack of security on the IoT world. Hence, it is important to understand the security issues and attack vectors in the IoT domain. Though significant research has been done to secure traditional computing systems, little focus was given to the IoT realm. In this work, we reduce this gap by developing a honeypot framework for IoT devices. Specifically, we introduce U-PoT: a novel honeypot framework for capturing attacks on IoT devices that use Universal Plug and Play (UPnP) protocol. A myriad of smart home devices including smart switches, smart bulbs, surveillance cameras, smart hubs, etc. uses the UPnP protocol. Indeed, a simple search on Shodan IoT search engine lists 1,676,591 UPnP devices that are exposed to public network. The popularity and ubiquitous nature of UPnP-based IoT device necessitates a full-fledged IoT honeypot system for UPnP devices. Our novel framework automatically creates a honeypot from UPnP device description documents and is extendable to any device types or vendors that use UPnP for communication. To the best of our knowledge, this is the first work towards a flexible and configurable honeypot framework for UPnP-based IoT devices. We released U-PoT under an open source license for further research and created a database of UPnP device descriptions. We also evaluated our framework on two emulated deices. Our experiments show that the emulated devices are able to mimic the behavior of a real IoT device and trick vendor-provided device management applications or popular IoT search engines while having minimal performance ovherhead.

READ FULL TEXT
research
05/21/2018

IoT2Vec: Identification of Similar IoT Devices via Activity Footprints

We consider a smart home or smart office environment with a number of Io...
research
11/04/2020

VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks

The ubiquitous nature of IoT devices has brought new and exciting applic...
research
06/14/2019

U2Fi: A Provisioning Scheme of IoT Devices with Universal Cryptographic Tokens

Provisioning is the starting point of the whole life-cycle of IoT device...
research
08/29/2022

IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks

Electronic locks can provide security- and convenience-enhancing feature...
research
05/07/2021

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries

Recent high-profile attacks on the Internet of Things (IoT) have brought...
research
10/11/2022

A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices

With the rapid growth in the number of IoT devices being added to the ne...
research
12/30/2018

The Device War - The War Between IOT Brands In A Household

Users buy compatible IOT devices from different brands with an expectati...

Please sign up or login with your details

Forgot password? Click here to reset