What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering

12/21/2021
by   Armin Ziaie Tabari, et al.
0

The growing number of Internet of Things (IoT) devices makes it imperative to be aware of the real-world threats they face in terms of cybersecurity. While honeypots have been historically used as decoy devices to help researchers/organizations gain a better understanding of the dynamic of threats on a network and their impact, IoT devices pose a unique challenge for this purpose due to the variety of devices and their physical connections. In this work, by observing real-world attackers' behavior in a low-interaction honeypot ecosystem, we (1) presented a new approach to creating a multi-phased, multi-faceted honeypot ecosystem, which gradually increases the sophistication of honeypots' interactions with adversaries, (2) designed and developed a low-interaction honeypot for cameras that allowed researchers to gain a deeper understanding of what attackers are targeting, and (3) devised an innovative data analytics method to identify the goals of adversaries. Our honeypots have been active for over three years. We were able to collect increasingly sophisticated attack data in each phase. Furthermore, our data analytics points to the fact that the vast majority of attack activities captured in the honeypots share significant similarity, and can be clustered and grouped to better understand the goals, patterns, and trends of IoT attacks in the wild.

READ FULL TEXT

page 4

page 8

page 10

research
03/02/2020

A First Step Towards Understanding Real-world Attacks on IoT Devices

With the rapid growth of Internet of Things (IoT) devices, it is imperat...
research
05/10/2023

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning

As IoT devices are becoming widely deployed, there exist many threats to...
research
09/23/2021

Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem

In cybersecurity, attackers range from brash, unsophisticated script kid...
research
08/11/2020

Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things

Journalists have long been the targets of both physical and cyber-attack...
research
09/14/2018

Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys

Smart toys have captured an increasing share of the toy market, and are ...
research
08/03/2022

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

The ubiquity and pervasiveness of modern Internet of Things (IoT) device...
research
04/01/2022

Assimilation of Satellite Active Fires Data

Wildland fires pose an increasingly serious problem in our society. The ...

Please sign up or login with your details

Forgot password? Click here to reset