Yamauchi, Toshihiro Graduate School of Natural Science and Technology Okayama University ORCID Kaken ID publons researchmap
Yoshimoto, Ryota Graduate School of Natural Science and Technology Okayama University
Baba, Takahiro Graduate School of Natural Science and Technology Okayama University
Yoshioka, Katsunari Graduate School of Environment and Information Sciences / Institute of Advanced Sciences Yokohama National University
Mirai is an active malware that targets and poses constant threats to IoT devices. IoT malware penetrates IoT devices illegally, makes them download other malware such as bots, and infects them. Therefore, to improve the security of IoT devices, it is important to analyze the behaviors of IoT malware and take countermeasures. In this study, to analyze the behaviors of IoT malware after entering IoT devices and propose new security functions for operating systems to prevent activities such as IoT malware infection, we analyze Telnet logs collected by a honeypot of IoT devices. Thereafter, we report the analysis results regarding IoT malware input commands. The results show that many commands related to shell execution, file download, changing file permissions, and file transfer, are often executed by IoT malware.
This is an Accepted Manuscript of an article published by Conference Publishing Services.
This fulltext is available in Aug. 2023.
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Proceedings of 2021 10th International Congress on Advanced Applied Informatics
Conference Publishing Services, IEEE Computer Society
Copyright © 2021 IEEE.