{"title":"通过分析物联网设备的性能和流量特征,早期发现对物联网设备的侦察攻击","authors":"Prathibha Keshavamurthy, Sarvesh Kulkarni","doi":"10.1109/CSR57506.2023.10224986","DOIUrl":null,"url":null,"abstract":"Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics\",\"authors\":\"Prathibha Keshavamurthy, Sarvesh Kulkarni\",\"doi\":\"10.1109/CSR57506.2023.10224986\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.\",\"PeriodicalId\":354918,\"journal\":{\"name\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR57506.2023.10224986\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224986","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics
Cyber attackers use various techniques to gather information about a target in order to identify the vulnerabilities of the target and plan their attack on the target. The first step in planning an attack is reconnaissance. A simple port scan can reveal a lot of useful information about the target machine. Open source tools like ‘nmap’ can quickly scan and gather significant information about hosts on the Internet and provide a great insight into these systems. One cannot attack a system that is not visible to them. When a target system does not respond to scans by attackers, that can be an effective ‘prevention is better than cure’ approach to defense. When a host is actively scanned for multiple open ports by one or more sources, unusual transformations occur in its CPU utilization, the number of incoming and outgoing packets and their average sizes. The purpose of this work is to identify the reliable anomaly markers and demonstrate how they may be used in detecting and preventing reconnaissance scans extremely quickly. We demonstrate promising results for automated early reconnaissance detection and blocking, with live packet capture and analysis. Our proposed solution requires only modest computational resources and can thus operate on resource-constrained Internet of Things (loT) devices and other embedded systems.