Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

被引:4
|
作者
Poornachandran, Prabaharan [1 ]
Sreeram, R. [1 ]
Krishnan, Manu R. [1 ]
Pal, Soumajit [1 ]
Sankar, Prem A. U. [1 ]
Ashok, Aravind [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Amrita Ctr Cyber Secur Syst & Networks, Kollam, India
关键词
SOHO routers; DNS Changer; Internet of Vulnerable Things; Information Security; Vulnerabilities;
D O I
10.1109/ICIT.2015.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks. Focusing on the Indian Autonomous System Number (ASN) space, we performed scans over 3 months to successfully find vulnerable routers and extracted the DNS information from these vulnerable routers. In this paper we present the methodology followed for scanning, a detailed analysis report of the information we were able to collect and an insight into the current trends in the attack patterns. We conclude by proposing recommendations for mitigating these attacks.
引用
收藏
页码:119 / 123
页数:5
相关论文
共 50 条
  • [1] IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids
    Anand, Pooja
    Singh, Yashwant
    Selwal, Arvind
    Singh, Pradeep Kumar
    Felseghi, Raluca Andreea
    Raboaca, Maria Simona
    ENERGIES, 2020, 13 (18)
  • [2] Scanning for Vulnerable Devices in the Internet of Things
    Markowsky, Linda
    Markowsky, George
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOLS 1-2, 2015, : 463 - 467
  • [3] Internet of vulnerable things: New industrial attack vectors
    Rothschild, Michael
    Control Engineering, 2020, 67 (09) : 27 - 32
  • [4] Uninvited Connections A Study of Vulnerable Devices on the Internet of Things (IoT)
    Patton, Mark
    Gross, Eric
    Chinn, Ryan
    Forbis, Samantha
    Walker, Leon
    Chen, Hsinchun
    2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, : 232 - 235
  • [5] ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet
    Wu, Yixiong
    Song, Shangru
    Zhuge, Jianwei
    Yin, Tingting
    Li, Tianyi
    Zhu, Junmin
    Guo, Guannan
    Liu, Yue
    Hu, Jianju
    Communications in Computer and Information Science, 2023, 1851 CCIS : 1 - 24
  • [6] Detecting the vulnerable plaque in patients
    Goncalves, I.
    den Ruijter, H.
    Nahrendorf, M.
    Pasterkamp, G.
    JOURNAL OF INTERNAL MEDICINE, 2015, 278 (05) : 520 - 530
  • [7] Detecting vulnerable coronary plaques
    Davies, MJ
    LANCET, 1996, 347 (9013): : 1422 - 1423
  • [8] Novel Experimental Prototype for Determining Malicious Degree in Vulnerable Environment of Internet-of-Things
    Anil, G. N.
    CYBERNETICS PERSPECTIVES IN SYSTEMS, VOL 3, 2022, 503 : 200 - 211
  • [9] Real-Time Streaming Challenges in Internet of Video Things (IoVT)
    Sammoud, Ahmed
    Kumar, Ashok
    Bayoumi, Magdy
    Elarabi, Tarek
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 2106 - 2109
  • [10] Intracoronary Imaging for Detecting Vulnerable Plaque
    Fujii, Kenichi
    Hao, Hiroyuki
    Ohyanagi, Mitsumasa
    Masuyama, Tohru
    CIRCULATION JOURNAL, 2013, 77 (03) : 588 - 595