通过分析物联网设备的性能和流量特征,早期发现对物联网设备的侦察攻击

Prathibha Keshavamurthy, Sarvesh Kulkarni
{"title":"通过分析物联网设备的性能和流量特征,早期发现对物联网设备的侦察攻击","authors":"Prathibha Keshavamurthy, Sarvesh Kulkarni","doi":"10.1109/CSR57506.2023.10224986","DOIUrl":null,"url":null,"abstract":"Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics\",\"authors\":\"Prathibha Keshavamurthy, Sarvesh Kulkarni\",\"doi\":\"10.1109/CSR57506.2023.10224986\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.\",\"PeriodicalId\":354918,\"journal\":{\"name\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR57506.2023.10224986\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络攻击者使用各种技术来收集有关目标的信息,以便识别目标的漏洞并计划对目标的攻击。策划进攻的第一步是侦察。简单的端口扫描可以揭示关于目标计算机的许多有用信息。像' nmap '这样的开源工具可以快速扫描和收集有关Internet上主机的重要信息,并提供对这些系统的深入了解。一个人不能攻击一个他们看不见的系统。当目标系统对攻击者的扫描没有响应时,这可能是一种有效的“预防胜于治疗”的防御方法。当主机被一个或多个源主动扫描多个开放端口时,它的CPU利用率、传入和传出数据包的数量及其平均大小都会发生不寻常的变化。这项工作的目的是确定可靠的异常标记,并演示如何将它们用于极其快速地检测和防止侦察扫描。我们展示了具有实时数据包捕获和分析的自动化早期侦察检测和阻塞的有希望的结果。我们提出的解决方案只需要适度的计算资源,因此可以在资源受限的物联网(loT)设备和其他嵌入式系统上运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics
Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信