このエントリーをはてなブックマークに追加
ID 62292
FullText URL
Author
Yamauchi, Toshihiro Graduate School of Natural Science and Technology Okayama University ORCID Kaken ID publons researchmap
Yoshimoto, Ryota Graduate School of Natural Science and Technology Okayama University
Baba, Takahiro Graduate School of Natural Science and Technology Okayama University
Yoshioka, Katsunari Graduate School of Environment and Information Sciences / Institute of Advanced Sciences Yokohama National University
Abstract
Mirai is an active malware that targets and poses constant threats to IoT devices. IoT malware penetrates IoT devices illegally, makes them download other malware such as bots, and infects them. Therefore, to improve the security of IoT devices, it is important to analyze the behaviors of IoT malware and take countermeasures. In this study, to analyze the behaviors of IoT malware after entering IoT devices and propose new security functions for operating systems to prevent activities such as IoT malware infection, we analyze Telnet logs collected by a honeypot of IoT devices. Thereafter, we report the analysis results regarding IoT malware input commands. The results show that many commands related to shell execution, file download, changing file permissions, and file transfer, are often executed by IoT malware.
Keywords
IoT
malware
Telnet log
Note
This is an Accepted Manuscript of an article published by Conference Publishing Services.
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Published Date
2021
Publication Title
Proceedings of 2021 10th International Congress on Advanced Applied Informatics
Publisher
Conference Publishing Services, IEEE Computer Society
Start Page
913
End Page
915
Content Type
Conference Paper
language
English
OAI-PMH Set
岡山大学
Copyright Holders
Copyright © 2021 IEEE.
File Version
author
DOI
Related Url
isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160
Citation
T. Yamauchi, R. Yoshimoto, T. Baba and K. Yoshioka, "Analysis of commands of Telnet logs illegally connected to IoT devices," 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI), Niigata, Japan, 2021, pp. 913-915, doi: 10.1109/IIAI-AAI53430.2021.00160.