Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim
{"title":"物联网安全漏洞:网络摄像头的案例研究","authors":"Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim","doi":"10.23919/ICACT.2018.8323685","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":"{\"title\":\"IoT security vulnerability: A case study of a Web camera\",\"authors\":\"Yogeesh Seralathan, T. Oh, Suyash Jadhav, Jonathan Myers, J. Jeong, Young Ho Kim, J. Kim\",\"doi\":\"10.23919/ICACT.2018.8323685\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.\",\"PeriodicalId\":228625,\"journal\":{\"name\":\"2018 20th International Conference on Advanced Communication Technology (ICACT)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"48\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 20th International Conference on Advanced Communication Technology (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICACT.2018.8323685\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 20th International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT.2018.8323685","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IoT security vulnerability: A case study of a Web camera
The Internet of Things (IoT) are devices which are connected and controlled over the internet. The use of IoT devices has increased exponentially over time and knowingly or unknowingly our data is captured by IoT devices on a daily basis. Recent news on malware targeting IoT devices and some current research reveals that in most cases there are no security controls implemented on these devices. The exponential rise in the use of IoT devices, more processing of sensitive data by these devices, and their mass exploitation was the motivation behind our work. Malware like Mirai is currently being used to build large botnets which are used in DDoS attacks where up to 1.2 Terabytes of networks traffic is generated every second. We will discuss the threats when there is a compromise of an IoT device's security and provide a case study of an IP camera. We also cover aspects of how and why modern malware targets IoT devices specifically. We finally discuss the importance of securing IoT and provide essential security practices for mitigating device exploitation.