Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F18%3A00108865" target="_blank" >RIV/00216224:14610/18:00108865 - isvavai.cz</a>
Result on the web
<a href="https://ieeexplore.ieee.org/document/8644468" target="_blank" >https://ieeexplore.ieee.org/document/8644468</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/GLOCOMW.2018.8644468" target="_blank" >10.1109/GLOCOMW.2018.8644468</a>
Alternative languages
Result language
angličtina
Original language name
Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations
Original language description
While the security issue associated with the Internet-of-Things (IoT) continues to attract significant attention from the research and operational communities, the visibility of IoT security-related data hinders the prompt inference and remediation of IoT maliciousness. In an effort to address the IoT security problem at large, in this work, we extend passive monitoring and measurements by investigating network telescope data to infer and analyze malicious activities generated by compromised IoT devices deployed in various domains. Explicitly, we develop a data-driven approach to pinpoint exploited IoT devices, investigate and differentiate their illicit actions, and examine their hosting environments. More importantly, we conduct discussions with various entities to obtain IP allocation information, which further allows us to attribute IoT exploitations per business sector (i.e., education, financial, manufacturing, etc.). Our analysis draws upon 1.2 TB of darknet data that was collected from a /8 network telescope for a 1 day period. The outcome signifies an alarming number of compromised IoT devices. Notably, around 940 of them fell victims of DDoS attacks, while 55,000 IoT nodes were shown to be compromised, aggressively probing Internet-wide hosts. Additionally, we inferred alarming IoT exploitations in various critical sectors such as the manufacturing, financial and healthcare realms.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10200 - Computer and information sciences
Result continuities
Project
<a href="/en/project/EF16_019%2F0000822" target="_blank" >EF16_019/0000822: CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2018
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
2018 IEEE Globecom Workshops
ISBN
9781538649206
ISSN
2166-0069
e-ISSN
—
Number of pages
7
Pages from-to
1-7
Publisher name
IEEE
Place of publication
Abu Dhabi
Event location
Abu Dhabi
Event date
Dec 9, 2018
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000462817000273