论文标题
了解现实世界对物联网设备的攻击的第一步
A First Step Towards Understanding Real-world Attacks on IoT Devices
论文作者
论文摘要
随着物联网(IoT)设备的快速增长,必须主动理解对它们构成的现实网络安全威胁。本文描述了我们为建立蜜罐生态系统的最初努力,以此作为收集和分析针对物联网设备的真实攻击数据的一种手段。蜜罐产生有用见解的主要条件是让攻击者认为它们是人类和组织使用的实际系统。由于各种设备类型和物理连接性质,IoT设备在这方面构成了独特的挑战。因此,我们创建了一种基于多形的方法来构建Honeypot生态系统,研究人员可以通过观察现实世界攻击者的行为来逐渐增加低相互作用的Honeypot在模拟IoT设备方面的复杂性。我们在本地和云中部署了蜜饯,并通过相关的分析和审查基础架构来确保不能轻松地将这些蜜罐识别为真实的系统。通过这样做,我们能够吸引越来越复杂的攻击数据。我们介绍了该Honeypot生态系统的设计以及到目前为止我们对攻击数据的观察。我们的数据表明,现实世界中的攻击者正在明确追随物联网设备,并且一些捕获的活动似乎涉及人类的直接互动(而不是脚本自动活动)。我们还为物联网相机(称为Honeycamera)建造了一个低相互作用的蜜罐,它显示给攻击者看似真实的视频。这是我们迈向建立一个更全面的蜜罐生态系统的第一步,该系统将使研究人员能够对IoT设备上的攻击者的追求有具体的了解,从而更加主动地保护它们。
With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them. This paper describes our initial efforts towards building a honeypot ecosystem as a means to gathering and analyzing real attack data against IoT devices. A primary condition for a honeypot to yield useful insights is to let attackers believe they are real systems used by humans and organizations. IoT devices pose unique challenges in this respect, due to the large variety of device types and the physical-connectedness nature. We thus create a multiphased approach in building a honeypot ecosystem, where researchers can gradually increase a low-interaction honeypot's sophistication in emulating an IoT device by observing real-world attackers' behaviors. We deployed honeypots both on-premise and in the cloud, with associated analysis and vetting infrastructures to ensure these honeypots cannot be easily identified as such and appear to be real systems. In doing so we were able to attract increasingly sophisticated attack data. We present the design of this honeypot ecosystem and our observation on the attack data so far. Our data shows that real-world attackers are explicitly going after IoT devices, and some captured activities seem to involve direct human interaction (as opposed to scripted automatic activities). We also build a low interaction honeypot for IoT cameras, called Honeycamera, that present to attackers seemingly real videos. This is our first step towards building a more comprehensive honeypot ecosystem that will allow researchers to gain concrete understanding of what attackers are going after on IoT devices, so as to more proactively protect them.