IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Title | IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Wang, B., Dou, Y., Sang, Y., Zhang, Y., Huang, J. |
Conference Name | ICC 2020 - 2020 IEEE International Conference on Communications (ICC) |
Date Published | June 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-5089-5 |
Keywords | authentication, authentication services, authorisation, Bridges, command injection attacks, composability, Computer hacking, homology analysis, honeypot, hybrid IoT honeypot, Internet of Things, invasive software, IoT, IoT device, IoTC-MAL, IoTCMal, low-interactive IoT honeypots, malicious samples, Malware, Metrics, network-connected devices, pubcrawl, resilience, Resiliency, Servers, video surveillance, virtual environment, virtualisation, vulnerabilities |
Abstract | Nowadays, the emerging Internet-of-Things (IoT) emphasize the need for the security of network-connected devices. Additionally, there are two types of services in IoT devices that are easily exploited by attackers, weak authentication services (e.g., SSH/Telnet) and exploited services using command injection. Based on this observation, we propose IoTCMal, a hybrid IoT honeypot framework for capturing more comprehensive malicious samples aiming at IoT devices. The key novelty of IoTC-MAL is three-fold: (i) it provides a high-interactive component with common vulnerable service in real IoT device by utilizing traffic forwarding technique; (ii) it also contains a low-interactive component with Telnet/SSH service by running in virtual environment. (iii) Distinct from traditional low-interactive IoT honeypots[1], which only analyze family categories of malicious samples, IoTCMal primarily focuses on homology analysis of malicious samples. We deployed IoTCMal on 36 VPS1 instances distributed in 13 cities of 6 countries. By analyzing the malware binaries captured from IoTCMal, we discover 8 malware families controlled by at least 11 groups of attackers, which mainly launched DDoS attacks and digital currency mining. Among them, about 60% of the captured malicious samples ran in ARM or MIPs architectures, which are widely used in IoT devices. |
URL | https://ieeexplore.ieee.org/document/9149314 |
DOI | 10.1109/ICC40277.2020.9149314 |
Citation Key | wang_iotcmal_2020 |
- IoTC-MAL
- vulnerabilities
- virtualisation
- virtual environment
- video surveillance
- Servers
- Resiliency
- resilience
- pubcrawl
- network-connected devices
- Metrics
- malware
- malicious samples
- low-interactive IoT honeypots
- IoTCMal
- authentication
- IoT device
- IoT
- invasive software
- Internet of Things
- hybrid IoT honeypot
- honeypot
- homology analysis
- Computer hacking
- composability
- command injection attacks
- Bridges
- authorisation
- authentication services