4.7 Article

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

期刊

COMPUTER NETWORKS
卷 206, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2022.108768

关键词

Internet of Things; Endpoints; Malware

资金

  1. AFRL, United States of America (Air Force Research Lab) summer program
  2. NSF [CNS-1814417]
  3. NRF (National Research Foundation of Korea) [2016K1A1A2912757]
  4. Cyber Florida Seed Grant, United States of America
  5. Information Security and Cybersecurity Unit at King Khalid University, Abha, Saudi Arabia

向作者/读者索取更多资源

This paper analyzes IoT malware and focuses on endpoints reachable on the public Internet, revealing patterns of affinity between sources and targets of attacks and the exposure of attacks by Internet infrastructure. This investigation provides profound insights into the role of endpoints in IoT malware attacks, deepening our understanding of IoT malware ecosystems and aiding future defenses.
The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, that play an essential part in the IoT malware ecosystem. Namely, we analyze endpoints acting as dropzones and their targets to gain insights into the underlying dynamics in this ecosystem, such as the affinity between the dropzones and their target IP addresses, and the different patterns among endpoints. Towards this goal, we reverse-engineer 2423 IoT malware samples and extract strings from them to obtain IP addresses. We further gather information about these endpoints from public Internet-wide scanners, such as Shodan and Censys. Our results, through analysis and visualization expose clear patterns of affinity between sources and targets of attacks, attack exposure by Internet infrastructure, and clear depiction of the ecosystem of IoT malware as a whole, only utilizing static artifacts. Our investigation from four different perspectives provides profound insights into the role of endpoints in IoT malware attacks, which deepens our understanding of IoT malware ecosystems and can assist future defenses.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据