USB Rubber Ducky Detection by using Heuristic Rules

Lakshay Arora, Narina Thakur, S. Yadav
{"title":"USB Rubber Ducky Detection by using Heuristic Rules","authors":"Lakshay Arora, Narina Thakur, S. Yadav","doi":"10.1109/ICCCIS51004.2021.9397064","DOIUrl":null,"url":null,"abstract":"With the rise in tightening of the Cybersecurity rules and policies implemented by the corporate houses, the work that malicious hackers need to do to compromise a system has risen exponentially. A significant part of a hacker's work goes into the bypassing of the firewalls and intrusion into the main systems. A comparatively easy way to bypass all systems is USB rubber ducky, which is a simple USB stick that impersonates a keyboard by changing its hardware ID and thus executing commands as if a user was manually typing them. This attack has proved to exploit the least proficient part of cyber-defense that is humans. In this research paper, we discuss a utility that can easily detect malicious USB by using heuristic checks. This utility, named ducky-detector, can easily segregate keyboard input by finding the discrepancies that arise due to the automated functioning of the USB rubber ducky device. Ducky-Detector has proved to out-smarten all the present solutions to this problem with almost perfect accuracy, no false positives, and really low computational power required. Ducky detector has been tested against a wide variety of commercial and free Antivirus software with variable payloads, thus simulating a real-life scenario where payloads can vary to any extent. Ducky-detector induces a mere 0.9% overhead on a Linux distribution system.","PeriodicalId":316752,"journal":{"name":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS51004.2021.9397064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

With the rise in tightening of the Cybersecurity rules and policies implemented by the corporate houses, the work that malicious hackers need to do to compromise a system has risen exponentially. A significant part of a hacker's work goes into the bypassing of the firewalls and intrusion into the main systems. A comparatively easy way to bypass all systems is USB rubber ducky, which is a simple USB stick that impersonates a keyboard by changing its hardware ID and thus executing commands as if a user was manually typing them. This attack has proved to exploit the least proficient part of cyber-defense that is humans. In this research paper, we discuss a utility that can easily detect malicious USB by using heuristic checks. This utility, named ducky-detector, can easily segregate keyboard input by finding the discrepancies that arise due to the automated functioning of the USB rubber ducky device. Ducky-Detector has proved to out-smarten all the present solutions to this problem with almost perfect accuracy, no false positives, and really low computational power required. Ducky detector has been tested against a wide variety of commercial and free Antivirus software with variable payloads, thus simulating a real-life scenario where payloads can vary to any extent. Ducky-detector induces a mere 0.9% overhead on a Linux distribution system.
基于启发式规则的USB橡皮鸭检测
随着企业实施的网络安全规则和政策越来越严格,恶意黑客需要做的破坏系统的工作呈指数级增长。黑客工作的一个重要部分是绕过防火墙并侵入主要系统。绕过所有系统的一个相对简单的方法是USB橡皮鸭,这是一个简单的USB棒,通过更改其硬件ID来模拟键盘,从而执行命令,就好像用户手动输入命令一样。事实证明,这种攻击利用了网络防御中最不熟练的部分,即人类。在这篇研究论文中,我们讨论了一个实用程序,可以很容易地检测恶意USB使用启发式检查。这个名为duck -detector的实用程序可以通过查找由于USB橡胶ducky设备的自动功能而产生的差异来轻松地隔离键盘输入。事实证明,Ducky-Detector比所有现有的解决方案都要聪明,它几乎具有完美的准确性,没有误报,而且所需的计算能力非常低。Ducky检测器已经针对各种可变有效载荷的商业和免费防病毒软件进行了测试,从而模拟了有效载荷可以变化到任何程度的现实生活场景。duck -detector在Linux发行系统上的开销仅为0.9%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信