Defending IoT Devices from Malware

التفاصيل البيبلوغرافية
العنوان: Defending IoT Devices from Malware
المؤلفون: Nhien-An Le-Khac, Kim-Kwang Raymond Choo, William O’Sullivan
المصدر: Studies in Big Data ISBN: 9783030471309
Cyber and Digital Forensic Investigations
بيانات النشر: Springer International Publishing, 2020.
سنة النشر: 2020
مصطلحات موضوعية: Computer science, Action plan, Botnet, Malware, Denial-of-service attack, Attack surface, Malware analysis, Computer security, computer.software_genre, computer, Counterattack, Countermeasure (computer)
الوصف: As the number of internet users continues to grow, so do the numbers and types of devices people connect to; hence, a larger attack surface. For example, the Qbot and Mirai botnet malware are capable of infecting devices across different chipset architectures, and both malware were reportedly responsible for a number of high profile DDoS attacks in recent times. These two malware families (and many others) generally affect a broad range of consumer grade appliances, and many of these appliances (also referred to as devices) are insecure or not designed with security in mind. While researchers have focused on areas such as attacking the botnet owner’s payment infrastructure, reversing the botnet and using it as a countermeasure in grey-hat counterattack, etc., there are many more questions that have not been addressed. For example, are users putting too much trust in manufacturers and failing to take adequate measures to protect their own networks? Hence, in this paper we investigate two most popular families of Internet of Things (IoT) malware, Mirai and Qbot, to understand how they spread, what attacks they are capable of, who could be responsible, and what are the motivations of the threat actors. We also propose an efficient solution to scan for Mirai- and Qbot-related vulnerabilities in IoT devices and systems. We then study what companies can do to help protect themselves from attacks. Simple steps such as correctly configuring appliances, carrying out risk assessments and creating an action plan are discussed as proactive measures that could be taken to facilitate threat reduction and incident response.
ردمك: 978-3-030-47130-9
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::b8fd5d229815663892669e9a7de2156b
https://doi.org/10.1007/978-3-030-47131-6_2
حقوق: OPEN
رقم الأكسشن: edsair.doi...........b8fd5d229815663892669e9a7de2156b
قاعدة البيانات: OpenAIRE