IoT and the Risk of Internet Exposure: Risk Assessment using Shodan Queries

被引:14
作者
Albataineh, Areej [1 ]
Alsmadi, Izzat [2 ]
机构
[1] Our Lady Lake Univ Nio, San Antonio, TX 78207 USA
[2] Univ Texas A&M, San Antonio, TX USA
来源
2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM) | 2019年
关键词
Internet of Things (IoT); Shodan; vulnerabilities; vulnerability assessment;
D O I
10.1109/wowmom.2019.8792986
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Since its introduction several years ago, Shodan has been used in several research projects related to security assessment of IoT devices publicly facing the Internet. Despite the fact that many of the queries that can expose those devices are publicly known, yet subsequent assessments continue to indicate the existence of instances of those vulnerabilities. In this paper, we conducted a remote security assessment based on an extended dataset from original public Shodan queries (with known terms to expose vulnerabilities). Based on our own assessment for the terms in the public Shodan queries, we updated the list to cover other important query terms that were reported for remote back-door access. Results showed that many of those public queries in the original Shodan list can still exploit several systems and devices facing the Internet. Similarly, many of the newly added queries indicate existing vulnerabilities in some live systems in the US in particular and also worldwide. Vulnerabilities related to default or trivial passwords in IoT devices were reported in SHINE and other assessment projects. Nonetheless, many of those vulnerabilities that are easy to fix, still exist in publicly visible IoT devices.
引用
收藏
页数:5
相关论文
共 6 条
[1]   Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices [J].
Bodenheim, Roland ;
Butts, Jonathan ;
Dunlap, Stephen ;
Mullins, Barry .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2014, 7 (02) :114-123
[2]  
Forbis S., 2015, INTEGRATION ZMAP SHO
[3]   Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT) [J].
Patton, Mark ;
Gross, Eric ;
Chinn, Ryan ;
Forbis, Samantha ;
Walker, Leon ;
Chen, Hsinchun .
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, :232-235
[4]  
Radvanosky R., 2015, 10 SANS ICS SEC SUMM
[5]   Vulnerability Analysis Using Google and Shodan [J].
Simon, Kai .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 :725-730
[6]  
Williams P. M., 2014, AFITENGT14J41 WRIGHT