Stories from a Customized Honeypot for the IoT

Javier Carrillo-Mondejar Javier Carrillo-Mondejar, José Roldán-Gómez Javier Carrillo-Mondejar, Juan Manuel Castelo Gómez José Roldán-Gómez, Sergio Ruiz Villafranca Juan Manuel Castelo Gómez, Guillermo Suarez-Tangil Sergio Ruiz Villafranca
{"title":"Stories from a Customized Honeypot for the IoT","authors":"Javier Carrillo-Mondejar Javier Carrillo-Mondejar, José Roldán-Gómez Javier Carrillo-Mondejar, Juan Manuel Castelo Gómez José Roldán-Gómez, Sergio Ruiz Villafranca Juan Manuel Castelo Gómez, Guillermo Suarez-Tangil Sergio Ruiz Villafranca","doi":"10.53106/160792642024012501010","DOIUrl":null,"url":null,"abstract":"\n Since the inception of the Internet of Things (IoT), the security measures implemented on its devices have been too weak to ensure the appropriate protection of the data that they handle. Appealed by this, cybercriminals continuously seek out for vulnerable units to control, leading to attacks spreading through networks and infecting a high number of devices. On top of that, while the IoT has evolved to provide a higher degree of security, the techniques used by attackers have done so as well, which has led to the need of continuously studying the way in which these attacks are performed to gather significant knowledge for the development of the pertinent security measures. In view of this, we analyze the state of IoT attacks by developing a high-interaction honeypot for SSH and Telnet services that simulates a custom device with the ARM architecture. This study is carried out in two steps. Firstly, we analyze and classify the interaction between the attacker and the devices by clustering the commands that they sent in the compromised Telnet and SSH sessions. Secondly, we study the malware samples that are downloaded and executed in each session and classify them based on the sequence of system calls that they execute at runtime. In addition, apart from studying the active data generated by the attacker, we extract the information that is left behind after a connection with the honeypot by inspecting the metadata associated with it. In total, more than 1,578 malicious samples were collected after 9,926 unique IP addresses interacted with the system, with the most downloaded malware family being Hajime, with 70.5% of samples belonging to it, and also detecting others such as Mirai, Gafgyt, Dofloo and Xorddos.\n \n","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"66 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"網際網路技術學刊","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53106/160792642024012501010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Since the inception of the Internet of Things (IoT), the security measures implemented on its devices have been too weak to ensure the appropriate protection of the data that they handle. Appealed by this, cybercriminals continuously seek out for vulnerable units to control, leading to attacks spreading through networks and infecting a high number of devices. On top of that, while the IoT has evolved to provide a higher degree of security, the techniques used by attackers have done so as well, which has led to the need of continuously studying the way in which these attacks are performed to gather significant knowledge for the development of the pertinent security measures. In view of this, we analyze the state of IoT attacks by developing a high-interaction honeypot for SSH and Telnet services that simulates a custom device with the ARM architecture. This study is carried out in two steps. Firstly, we analyze and classify the interaction between the attacker and the devices by clustering the commands that they sent in the compromised Telnet and SSH sessions. Secondly, we study the malware samples that are downloaded and executed in each session and classify them based on the sequence of system calls that they execute at runtime. In addition, apart from studying the active data generated by the attacker, we extract the information that is left behind after a connection with the honeypot by inspecting the metadata associated with it. In total, more than 1,578 malicious samples were collected after 9,926 unique IP addresses interacted with the system, with the most downloaded malware family being Hajime, with 70.5% of samples belonging to it, and also detecting others such as Mirai, Gafgyt, Dofloo and Xorddos.  
物联网定制蜜罐的故事
自物联网(IoT)诞生以来,在其设备上实施的安全措施一直过于薄弱,无法确保对其处理的数据提供适当的保护。受此影响,网络犯罪分子不断寻找易受攻击的设备进行控制,导致攻击通过网络传播并感染大量设备。此外,物联网在不断发展以提供更高的安全性的同时,攻击者所使用的技术也在不断发展,这就需要不断研究这些攻击的实施方式,以收集重要的知识来制定相关的安全措施。有鉴于此,我们开发了一个用于 SSH 和 Telnet 服务的高交互蜜罐,模拟一个采用 ARM 架构的定制设备,以此来分析物联网攻击的现状。这项研究分两步进行。首先,我们通过对攻击者在被入侵的 Telnet 和 SSH 会话中发送的命令进行聚类,对攻击者与设备之间的交互进行分析和分类。其次,我们研究在每个会话中下载和执行的恶意软件样本,并根据它们在运行时执行的系统调用序列对其进行分类。此外,除了研究攻击者生成的活动数据外,我们还通过检查与 "蜜罐 "相关的元数据,提取与 "蜜罐 "连接后留下的信息。在 9926 个独立 IP 地址与系统交互后,我们总共收集到超过 1578 个恶意样本,其中下载最多的恶意软件家族是 Hajime,70.5% 的样本属于该家族,此外还检测到 Mirai、Gafgyt、Dofloo 和 Xorddos 等其他恶意软件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信