Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

被引:4
|
作者
Poornachandran, Prabaharan [1 ]
Sreeram, R. [1 ]
Krishnan, Manu R. [1 ]
Pal, Soumajit [1 ]
Sankar, Prem A. U. [1 ]
Ashok, Aravind [1 ]
机构
[1] Amrita Vishwa Vidyapeetham Univ, Amrita Ctr Cyber Secur Syst & Networks, Kollam, India
来源
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015) | 2015年
关键词
SOHO routers; DNS Changer; Internet of Vulnerable Things; Information Security; Vulnerabilities;
D O I
10.1109/ICIT.2015.49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks. Focusing on the Indian Autonomous System Number (ASN) space, we performed scans over 3 months to successfully find vulnerable routers and extracted the DNS information from these vulnerable routers. In this paper we present the methodology followed for scanning, a detailed analysis report of the information we were able to collect and an insight into the current trends in the attack patterns. We conclude by proposing recommendations for mitigating these attacks.
引用
收藏
页码:119 / 123
页数:5
相关论文
共 50 条
  • [21] Implementation of an integrated home internet of things system for vulnerable older adults using a frailty-centered approach
    Ji Yeon Baek
    Se Hee Na
    Heayon Lee
    Hee-Won Jung
    Eunju Lee
    Min-Woo Jo
    Yu Rang Park
    Il-Young Jang
    Scientific Reports, 12
  • [22] Radiomics assessment of carotid intraplaque hemorrhage: detecting the vulnerable patients
    Shuai Zhang
    Lin Gao
    Bing Kang
    Xinxin Yu
    Ran Zhang
    Ximing Wang
    Insights into Imaging, 13
  • [23] On Applicability of Wireless Routers to Deployment of Smart Spaces in Internet of Things Environments
    Marchenkov, Sergey A.
    Korzun, Dmitry G.
    Shabaev, Anton I.
    Voronin, Anatoly V.
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 1000 - 1005
  • [24] Detecting vulnerable software functions via text and dependency features
    Xu, Wenlin
    Li, Tong
    Wang, Jinsong
    Tang, Yahui
    SOFT COMPUTING, 2023, 27 (09) : 5425 - 5435
  • [25] ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions
    Wang, Shih-Hung
    Wu, Chia-Chien
    Liang, Yu-Chuan
    Hsieh, Li-Hsun
    Hsiao, Hsu-Chun
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 380 - 385
  • [26] Radiomic Assessment of Pericoronary Adipose Tissue Detecting the Vulnerable Patient
    Mahabadi, Amir A.
    Rassaf, Tienush
    JACC-CARDIOVASCULAR IMAGING, 2020, 13 (11) : 2384 - 2385
  • [27] Detecting and Interpreting Faults in Vulnerable Power Grids With Machine Learning
    Eikeland, Odin Foldvik
    Holmstrand, Inga Setsa
    Bakkejord, Sigurd
    Chiesa, Matteo
    Bianchi, Filippo Maria
    IEEE ACCESS, 2021, 9 : 150686 - 150699
  • [28] Radiomics assessment of carotid intraplaque hemorrhage: detecting the vulnerable patients
    Zhang, Shuai
    Gao, Lin
    Kang, Bing
    Yu, Xinxin
    Zhang, Ran
    Wang, Ximing
    INSIGHTS INTO IMAGING, 2022, 13 (01)
  • [29] Detecting vulnerable software functions via text and dependency features
    Wenlin Xu
    Tong Li
    Jinsong Wang
    Yahui Tang
    Soft Computing, 2023, 27 : 5425 - 5435
  • [30] Uncovering Vulnerable Industrial Control Systems from the Internet Core
    Nawrocki, Marcin
    Schmidt, Thomas C.
    Wahlisch, Matthias
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,