IoT Malware Ecosystem in the Wild: A Glimpse into Analysis and Exposures

被引:12
作者
Choi, Jinchun [1 ]
Anwar, Afsah [1 ]
Alasmary, Hisham [1 ]
Spaulding, Jeffrey [2 ]
Nyang, DaeHun [3 ]
Mohaisen, Aziz [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] Canisius Coll, Buffalo, NY 14208 USA
[3] Inha Univ, Incheon, South Korea
来源
SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING | 2019年
基金
新加坡国家研究基金会;
关键词
Internet of Things; Endpoints; Malware; INTERNET;
D O I
10.1145/3318216.3363379
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection give adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, and play an essential part in the IoT malware ecosystem. Namely, we analyze endpoints acting as dropzones and their targets to gain insights into the underlying dynamics in this ecosystem, such as the affinity between the dropzones and their target IP addresses, and the different patterns among endpoints. Towards this goal, we reverse-engineer 2,423 IoT malware samples and extract strings from them to obtain IP addresses. We further gather information about these endpoints from public Internet-wide scanners, such as Shodan and Censys. For the masked IP addresses, we examine the Classless Inter-Domain Routing (CIDR) networks accumulating to more than 100 million (approximate to 78.2% of total active public IPv4 addresses) endpoints.
引用
收藏
页码:413 / 418
页数:6
相关论文
共 36 条
[1]  
Abusnaina A., 2019, 39 IEEE INT C DISTR, V10
[2]  
Alasmary Hisham, 2018, Computational Data and Social Networks. 7th International Conference, CSoNet 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11280), P259, DOI 10.1007/978-3-030-04648-4_22
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
[Anonymous], 2018, ARXIV PREPRINT ARXIV
[5]  
[Anonymous], 2018, SHODAN LANDING PAGE
[6]  
[Anonymous], 2018, CENSYS LANDING PAGE
[7]  
[Anonymous], 2018, ULTRATOOLS FREE IP T
[8]  
[Anonymous], 2018, RADARE2
[9]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[10]   If This Then What? Controlling Flows in IoT Apps [J].
Bastys, Iulia ;
Balliu, Musard ;
Sabelfeld, Andrei .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1102-1119