Presentation | 2020-03-02 An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa, Satoshi Hara, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running Telnet services on the Internet. It is yet unclear how many of them are already infected or at risk of infection. In this study, we analyze the status of IoT devices by combining the Internet wide scan data from Censys and attack source information observed in the darknet and honeypot during October 7, 2019 to December 29, 2019. We found out that 99.45% of devices running Telnet services were not infected. Moreover, we show that 78.85% of infected devices that were attacking Telnet services were not running Telnet. We were able to infer over 20 devices with such unique status from their response to the network scans. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IoT malware / Internet-wide scan / Darknet / Honeypot |
Paper # | ICSS2019-81 |
Date of Issue | 2020-02-24 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2020/3/2(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Okinawa-Ken-Seinen-Kaikan |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Security, Trust, etc. |
Chair | Hiroki Takakura(NII) |
Vice Chair | Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Secretary | Katsunari Yoshioka(NICT) / Kazunori Kamiya(KDDI labs.) |
Assistant | Keisuke Kito(Mitsubishi Electric) / Toshihiro Yamauchi(Okayama Univ.) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation |
Sub Title (in English) | |
Keyword(1) | IoT malware |
Keyword(2) | Internet-wide scan |
Keyword(3) | Darknet |
Keyword(4) | Honeypot |
1st Author's Name | Shun Morishita |
1st Author's Affiliation | Yokohama National University(YNU) |
2nd Author's Name | Kota Ogawa |
2nd Author's Affiliation | Yokohama National University(YNU) |
3rd Author's Name | Satoshi Hara |
3rd Author's Affiliation | Yokohama National University/FUJISOFT INCORPORATED(YNU/FSI) |
4th Author's Name | Rui Tanabe |
4th Author's Affiliation | Institute of Advanced Sciences, Yokohama National University(YNU) |
5th Author's Name | Katsunari Yoshioka |
5th Author's Affiliation | Graduate School of Environment and Information Sciences, Yokohama National University/Institute of Advanced Sciences, Yokohama(YNU) |
6th Author's Name | Tsutomu Matsumoto |
6th Author's Affiliation | Graduate School of Environment and Information Sciences, Yokohama National University/Institute of Advanced Sciences, Yokohama(YNU) |
Date | 2020-03-02 |
Paper # | ICSS2019-81 |
Volume (vol) | vol.119 |
Number (no) | ICSS-437 |
Page | pp.pp.79-84(ICSS), |
#Pages | 6 |
Date of Issue | 2020-02-24 (ICSS) |