このエントリーをはてなブックマークに追加
ID 62292
フルテキストURL
著者
Yamauchi, Toshihiro Graduate School of Natural Science and Technology Okayama University ORCID Kaken ID publons researchmap
Yoshimoto, Ryota Graduate School of Natural Science and Technology Okayama University
Baba, Takahiro Graduate School of Natural Science and Technology Okayama University
Yoshioka, Katsunari Graduate School of Environment and Information Sciences / Institute of Advanced Sciences Yokohama National University
抄録
Mirai is an active malware that targets and poses constant threats to IoT devices. IoT malware penetrates IoT devices illegally, makes them download other malware such as bots, and infects them. Therefore, to improve the security of IoT devices, it is important to analyze the behaviors of IoT malware and take countermeasures. In this study, to analyze the behaviors of IoT malware after entering IoT devices and propose new security functions for operating systems to prevent activities such as IoT malware infection, we analyze Telnet logs collected by a honeypot of IoT devices. Thereafter, we report the analysis results regarding IoT malware input commands. The results show that many commands related to shell execution, file download, changing file permissions, and file transfer, are often executed by IoT malware.
キーワード
IoT
malware
Telnet log
備考
This is an Accepted Manuscript of an article published by Conference Publishing Services.
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
発行日
2021
出版物タイトル
Proceedings of 2021 10th International Congress on Advanced Applied Informatics
出版者
Conference Publishing Services, IEEE Computer Society
開始ページ
913
終了ページ
915
資料タイプ
会議発表論文
言語
英語
OAI-PMH Set
岡山大学
著作権者
Copyright © 2021 IEEE.
論文のバージョン
author
DOI
関連URL
isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160
Citation
T. Yamauchi, R. Yoshimoto, T. Baba and K. Yoshioka, "Analysis of commands of Telnet logs illegally connected to IoT devices," 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI), Niigata, Japan, 2021, pp. 913-915, doi: 10.1109/IIAI-AAI53430.2021.00160.