IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker’s Perspective

N. Vlajic, Daiwei Zhou, Jonathan Tung
{"title":"IoT Cameras and DVRs as DDoS Reflectors: Pros and Cons from Hacker’s Perspective","authors":"N. Vlajic, Daiwei Zhou, Jonathan Tung","doi":"10.1109/ICII.2018.00035","DOIUrl":null,"url":null,"abstract":"The Mirai attacks of 2016 have shown the devastating DDoS potential of compromised IoT devices (primarily IoT cameras and DVRs), when nearly half a million of these devices were used to launch some of the largest and most devastating DDoS attacks recorded to date. One would hope that a full year later, the users and administrators of Internet-facing IoT devices have taken at least the basic measures towards reducing the likelihood that their devices get recruited as facilitators/executors of direct or reflected DDoS attacks. Unfortunately, the results of our recent study involving real-world IoT cameras and DVRs are rather discouraging as they show that: 1) with the existence of publicly accessible IoT search engines, such as Shodan, it has become easier than ever for hacker to discover and compromise IoT devices, of any kind and anywhere in the world, and 2) a significant number of these devices are inadequately protected against TCP-SYN floods and DDoS reflection - either by means of firewalls or at the OS-level. The aim of this article is to serve as a wake-up call to the users and administrators of Internet-facing IoT devices, and alert to the need to better protect these devices form being coopted by hackers for purposes of DDoS attacks.","PeriodicalId":330919,"journal":{"name":"2018 IEEE International Conference on Industrial Internet (ICII)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Industrial Internet (ICII)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICII.2018.00035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The Mirai attacks of 2016 have shown the devastating DDoS potential of compromised IoT devices (primarily IoT cameras and DVRs), when nearly half a million of these devices were used to launch some of the largest and most devastating DDoS attacks recorded to date. One would hope that a full year later, the users and administrators of Internet-facing IoT devices have taken at least the basic measures towards reducing the likelihood that their devices get recruited as facilitators/executors of direct or reflected DDoS attacks. Unfortunately, the results of our recent study involving real-world IoT cameras and DVRs are rather discouraging as they show that: 1) with the existence of publicly accessible IoT search engines, such as Shodan, it has become easier than ever for hacker to discover and compromise IoT devices, of any kind and anywhere in the world, and 2) a significant number of these devices are inadequately protected against TCP-SYN floods and DDoS reflection - either by means of firewalls or at the OS-level. The aim of this article is to serve as a wake-up call to the users and administrators of Internet-facing IoT devices, and alert to the need to better protect these devices form being coopted by hackers for purposes of DDoS attacks.
物联网摄像头和dvr作为DDoS反射器:从黑客的角度来看利弊
2016年的Mirai攻击表明,受到攻击的物联网设备(主要是物联网摄像头和dvr)具有毁灭性的DDoS攻击潜力,当时有近50万台这些设备被用来发起迄今为止规模最大、最具破坏性的DDoS攻击。人们希望一年后,面向互联网的物联网设备的用户和管理员至少已经采取了基本措施,以减少他们的设备被招募为直接或反射DDoS攻击的促进者/执行者的可能性。不幸的是,我们最近的研究结果涉及现实世界的物联网摄像头和dvr是相当令人沮丧,因为它们表明:1)公开存在的物联网搜索引擎,比如Shodan,它已经成为黑客的比以往更容易发现和妥协物联网设备,任何形式的和在世界任何地方,2)大量的这些设备对tcp syn洪水和DDoS保护不当的反射,通过防火墙或操作系统。本文的目的是为面向互联网的物联网设备的用户和管理员敲响警钟,提醒他们需要更好地保护这些设备,防止黑客利用这些设备进行DDoS攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信