Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3229565.3229572acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Public Access

IP-Based IoT Device Detection

Published: 07 August 2018 Publication History

Abstract

Recent IoT-based DDoS attacks have exposed how vulnerable the Internet can be to millions of insufficiently secured IoT devices. To understand the risks of these attacks requires learning about these IoT devices---where are they, how many are there, how are they changing? In this paper, we propose a new method to find IoT devices in Internet to begin to assess this threat. Our approach requires observations of flow-level network traffic and knowledge of servers run by the manufacturers of the IoT devices. We have developed our approach with 10 device models by 7 vendors and controlled experiments. We apply our algorithm to observations from 6 days of Internet traffic at a college campus and partial traffic from an IXP to detect IoT devices.

References

[1]
Anna-Senpai. Mirai Malware Source Code. https://github.com/jgamblin/Mirai-Source-Code.
[2]
Dyn. Dyn analysis summary of Friday October 21 attack. http://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/.
[3]
Gartner. The Internet of Things units installed base from 2014 to 2020. https://www.statista.com/statistics/370350/internet-of-things-installed-base-by-category/.
[4]
Guo, H., and Heidemann, J. IoT traces from 10 device we purchased. https://ant.isi.edu/datasets/iot/.
[5]
Krebs, B. KrebsOnSecurity hit with record DDoS. https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/.
[6]
Kurkowski, J. Python domain extraction library tldextract. https://pypi.python.org/pypi/tldextract.
[7]
Loshin, P. Details emerging on Dyn DNS DDoS attack, Mirai IoT botnet. blog http://searchsecurity.techtarget.com/news/450401962/Details-emerging-on-Dyn-DNS-DDoS-attack-Mirai-IoT-botnet, Oct. 2016.
[8]
Mozilla. Public suffix list from Mozilla foundation. https://www.publicsuffix.org/.
[9]
OVH. OVH news - the DDoS that didn't break the camel's VAC. https://www.ovh.com/us/news/articles/a2367.the-ddos-that-didnt-break-the-camels-vac.
[10]
SCIP. Belkin Wemo switch communications analysis. https://www.scip.ch/en/?labs.20160218.
[11]
Security, F. Passive DNS historical Internet database: Farsight DNSDB. https://www.farsightsecurity.com/solutions/dnsdb/.
[12]
Siby, S., Maiti, R. R., and Tippenhauer, N. O. IoTscanner: Detecting privacy threats in IoT neighborhoods. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security (New York, NY, USA, 2017), IoTPTS '17, ACM, pp. 23--30.
[13]
Sivanathan, A., Sherratt, D., Gharakheili, H. H., Radford, A., Wijenayake, C., Vishwanath, A., and Sivaraman, V. Characterizing and classifying IoT traffic in smart cities and campuses. In Proceedings of the IEEE Infocom Workshop on Smart Cities and Urban Computing (May 2017), pp. 559--564.
[14]
USC/LANDER. FRGP (www.frgp.net) Continuous Flow Dataset, traces taken 2015--05--10 to 2015--05--19. provided by the USC/LANDER project (http://www.isi.edu/ant/lander).

Cited By

View all
  • (2024)Device Type Classification Based on Two-Stage Traffic Behavior AnalysisIEICE Transactions on Communications10.1587/transcom.2023WWP0004E107.B:1(117-125)Online publication date: 1-Jan-2024
  • (2023)Efficient IoT Traffic Inference: From Multi-view Classification to Progressive MonitoringACM Transactions on Internet of Things10.1145/36253065:1(1-30)Online publication date: 16-Dec-2023
  • (2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IoT S&P '18: Proceedings of the 2018 Workshop on IoT Security and Privacy
August 2018
61 pages
ISBN:9781450359054
DOI:10.1145/3229565
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 August 2018

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

SIGCOMM '18
Sponsor:
SIGCOMM '18: ACM SIGCOMM 2018 Conference
August 20, 2018
Budapest, Hungary

Acceptance Rates

Overall Acceptance Rate 12 of 30 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)277
  • Downloads (Last 6 weeks)24
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Device Type Classification Based on Two-Stage Traffic Behavior AnalysisIEICE Transactions on Communications10.1587/transcom.2023WWP0004E107.B:1(117-125)Online publication date: 1-Jan-2024
  • (2023)Efficient IoT Traffic Inference: From Multi-view Classification to Progressive MonitoringACM Transactions on Internet of Things10.1145/36253065:1(1-30)Online publication date: 16-Dec-2023
  • (2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
  • (2023)How Polynomial Regression Improves DeNATingIEEE Transactions on Network and Service Management10.1109/TNSM.2023.326639020:4(5000-5011)Online publication date: Dec-2023
  • (2023)Dynamic Inference From IoT Traffic Flows Under Concept Drifts in Residential ISP NetworksIEEE Internet of Things Journal10.1109/JIOT.2023.326501210:17(15761-15773)Online publication date: 1-Sep-2023
  • (2023)CADeSH: Collaborative Anomaly Detection for Smart HomesIEEE Internet of Things Journal10.1109/JIOT.2022.319481310:10(8514-8532)Online publication date: 15-May-2023
  • (2023)Traffic Behavior-based Device Type Classification2023 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICNC57223.2023.10074041(353-357)Online publication date: 20-Feb-2023
  • (2023)A load balancing scheme of concurrent Internet of Things terminal equipment based on p-probability delay2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)10.1109/ICCEIC60201.2023.10426695(240-243)Online publication date: 20-Oct-2023
  • (2023)Research Methods Applied to Software Security2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)10.1109/CSCE60160.2023.00426(2668-2677)Online publication date: 24-Jul-2023
  • (2022)Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT DevicesResearch Anthology on Convergence of Blockchain, Internet of Things, and Security10.4018/978-1-6684-7132-6.ch023(382-401)Online publication date: 8-Jul-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media