Thales L. von Sperling, Francisco L. de Caldas Filho, R. D. de Sousa, Lucas M. C. e Martins, Rodrigo L. Rocha
{"title":"通过DNS流量分析跟踪物联网网络中的入侵者","authors":"Thales L. von Sperling, Francisco L. de Caldas Filho, R. D. de Sousa, Lucas M. C. e Martins, Rodrigo L. Rocha","doi":"10.1109/WCNPS.2017.8252938","DOIUrl":null,"url":null,"abstract":"The Internet of Things is increasingly gaining use in our society as can be seen by the significant growth in the number of devices connected to the most diverse Internet applications. But, most IoT devices include embedded software that cannot be updated and there is evidence that these devices present vulnerabilities exploitable even by the most simple forms of attacks, as for instance login attempts using simple combinations of known, or easy to guess, user identifications and passwords. These attacks would result in successful access by unauthorized entities to these devices. Considering these vulnerabilities, the concern for device protection mechanisms is raised. This paper proposes an IoT router that verifies the DNS traffic originated from IoT devices and performs the detection of IoT devices that are consulting unauthorized DNS servers. Our design is validated by means of a developed prototype that is submitted to functional tests in a real IoT network implemented in a controlled laboratory environment.","PeriodicalId":293027,"journal":{"name":"2017 Workshop on Communication Networks and Power Systems (WCNPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Tracking intruders in IoT networks by means of DNS traffic analysis\",\"authors\":\"Thales L. von Sperling, Francisco L. de Caldas Filho, R. D. de Sousa, Lucas M. C. e Martins, Rodrigo L. Rocha\",\"doi\":\"10.1109/WCNPS.2017.8252938\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things is increasingly gaining use in our society as can be seen by the significant growth in the number of devices connected to the most diverse Internet applications. But, most IoT devices include embedded software that cannot be updated and there is evidence that these devices present vulnerabilities exploitable even by the most simple forms of attacks, as for instance login attempts using simple combinations of known, or easy to guess, user identifications and passwords. These attacks would result in successful access by unauthorized entities to these devices. Considering these vulnerabilities, the concern for device protection mechanisms is raised. This paper proposes an IoT router that verifies the DNS traffic originated from IoT devices and performs the detection of IoT devices that are consulting unauthorized DNS servers. Our design is validated by means of a developed prototype that is submitted to functional tests in a real IoT network implemented in a controlled laboratory environment.\",\"PeriodicalId\":293027,\"journal\":{\"name\":\"2017 Workshop on Communication Networks and Power Systems (WCNPS)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Workshop on Communication Networks and Power Systems (WCNPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCNPS.2017.8252938\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Workshop on Communication Networks and Power Systems (WCNPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNPS.2017.8252938","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tracking intruders in IoT networks by means of DNS traffic analysis
The Internet of Things is increasingly gaining use in our society as can be seen by the significant growth in the number of devices connected to the most diverse Internet applications. But, most IoT devices include embedded software that cannot be updated and there is evidence that these devices present vulnerabilities exploitable even by the most simple forms of attacks, as for instance login attempts using simple combinations of known, or easy to guess, user identifications and passwords. These attacks would result in successful access by unauthorized entities to these devices. Considering these vulnerabilities, the concern for device protection mechanisms is raised. This paper proposes an IoT router that verifies the DNS traffic originated from IoT devices and performs the detection of IoT devices that are consulting unauthorized DNS servers. Our design is validated by means of a developed prototype that is submitted to functional tests in a real IoT network implemented in a controlled laboratory environment.