ID | 62292 |
FullText URL | |
Author |
Yamauchi, Toshihiro
Graduate School of Natural Science and Technology Okayama University
ORCID
Kaken ID
publons
researchmap
Yoshimoto, Ryota
Graduate School of Natural Science and Technology Okayama University
Baba, Takahiro
Graduate School of Natural Science and Technology Okayama University
Yoshioka, Katsunari
Graduate School of Environment and Information Sciences / Institute of Advanced Sciences Yokohama National University
|
Abstract | Mirai is an active malware that targets and poses constant threats to IoT devices. IoT malware penetrates IoT devices illegally, makes them download other malware such as bots, and infects them. Therefore, to improve the security of IoT devices, it is important to analyze the behaviors of IoT malware and take countermeasures. In this study, to analyze the behaviors of IoT malware after entering IoT devices and propose new security functions for operating systems to prevent activities such as IoT malware infection, we analyze Telnet logs collected by a honeypot of IoT devices. Thereafter, we report the analysis results regarding IoT malware input commands. The results show that many commands related to shell execution, file download, changing file permissions, and file transfer, are often executed by IoT malware.
|
Keywords | IoT
malware
Telnet log
|
Note | This is an Accepted Manuscript of an article published by Conference Publishing Services.
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Published Date | 2021
|
Publication Title |
Proceedings of 2021 10th International Congress on Advanced Applied Informatics
|
Publisher | Conference Publishing Services, IEEE Computer Society
|
Start Page | 913
|
End Page | 915
|
Content Type |
Conference Paper
|
language |
English
|
OAI-PMH Set |
岡山大学
|
Copyright Holders | Copyright © 2021 IEEE.
|
File Version | author
|
DOI | |
Related Url | isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160
|
Citation | T. Yamauchi, R. Yoshimoto, T. Baba and K. Yoshioka, "Analysis of commands of Telnet logs illegally connected to IoT devices," 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI), Niigata, Japan, 2021, pp. 913-915, doi: 10.1109/IIAI-AAI53430.2021.00160.
|