Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

被引:4
|
作者
Poornachandran, Prabaharan [1 ]
Sreeram, R. [1 ]
Krishnan, Manu R. [1 ]
Pal, Soumajit [1 ]
Sankar, Prem A. U. [1 ]
Ashok, Aravind [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Amrita Ctr Cyber Secur Syst & Networks, Kollam, India
来源
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015) | 2015年
关键词
SOHO routers; DNS Changer; Internet of Vulnerable Things; Information Security; Vulnerabilities;
D O I
10.1109/ICIT.2015.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks. Focusing on the Indian Autonomous System Number (ASN) space, we performed scans over 3 months to successfully find vulnerable routers and extracted the DNS information from these vulnerable routers. In this paper we present the methodology followed for scanning, a detailed analysis report of the information we were able to collect and an insight into the current trends in the attack patterns. We conclude by proposing recommendations for mitigating these attacks.
引用
收藏
页码:119 / 123
页数:5
相关论文
共 50 条
  • [11] Development of secure Internet of Vehicle Things (IoVT) for smart transportation system
    Karim, Ahmad
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [12] From Detecting the Vulnerable Plaque to Managing the Vulnerable Patient JACC State-of-the-Art Review
    Arbab-Zadeh, Armin
    Fuster, Valentin
    JOURNAL OF THE AMERICAN COLLEGE OF CARDIOLOGY, 2019, 74 (12) : 1582 - 1593
  • [13] The Correlation of Features in Detecting Cardiovascular Vulnerable Plaque
    Nazirun, N. N. N.
    Supriyanto, E.
    Baumgarten, D.
    Haueisen, J.
    Pohl, C.
    Omar, A. F.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ROBOTICS, AUTOMATION AND SCIENCES (ICORAS 2016), 2016,
  • [14] Engagement of vulnerable youths using internet platforms
    Chan, Melissa
    Li, Tim M. H.
    Law, Yik Wa
    Wong, Paul W. C.
    Chau, Michael
    Cheng, Cecilia
    Fu, King Wa
    Bacon-Shone, John
    Cheng, Qijin Emily
    Yip, Paul S. F.
    PLOS ONE, 2017, 12 (12):
  • [15] The vulnerable internet A study of the critical infrastructure of (the Dutch portion of) the Internet
    Luiijf, HAM
    Klaver, MHA
    Huizenga, J
    van Till, J
    de Boer, R
    van de Sandt, CHC
    Pont, PM
    CRITICAL INFRASTRUCTURES STATE OF THE ART IN RESEARCH AND APPLICATION, 2003, 65 : 11 - 37
  • [16] Fog Computing and Efficient Resource Management in the era of Internet-of-Video Things (IoVT)
    Perala, Sai Saketh Nandan
    Galanis, Ioannis
    Anagnostopoulos, Iraklis
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [17] Automatically Detecting Vulnerable Websites Before They Turn Malicious
    Soska, Kyle
    Christin, Nicolas
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 625 - 640
  • [18] Detecting Vulnerable Nodes in Urban Infrastructure Interdependent Network
    Mao, Jinzhu
    Cao, Liu
    Gao, Chen
    Wang, Huandong
    Fan, Hangyu
    Jin, Depeng
    Li, Yong
    PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 4617 - 4627
  • [19] Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things
    Karati, Arijit
    Fan, Chun-, I
    Zhuang, Er-Shuo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 3661 - 3669
  • [20] Implementation of an integrated home internet of things system for vulnerable older adults using a frailty-centered approach
    Baek, Ji Yeon
    Na, Se Hee
    Lee, Heayon
    Jung, Hee-Won
    Lee, Eunju
    Jo, Min-Woo
    Park, Yu Rang
    Jang, Il-Young
    SCIENTIFIC REPORTS, 2022, 12 (01)