このエントリーをはてなブックマークに追加
ID 68935
著者
Victor, Hervet Okayama University
Kobayashi, Satoru Faculty of Environmental, Life, Natural Science and Technology, Okayama University
Yamauchi, Toshihiro Faculty of Environmental, Life, Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
抄録
With the continuous proliferation of Internet of Things (IoT) devices, malware threats that specifically target these devices continue to increase. The urgent need for robust security measures is predicated on a comprehensive understanding of the behavioral patterns of IoT malware. However, previous studies have often overlooked the analysis of command sequences in Telnet logs. This study bridges this research gap by examining the post-injection behaviors of attackers. By analyzing a vast dataset comprising more than ten million logs collected from an IoT honeypot, we reveal three distinct post-injection activity patterns, each with unique characteristics. These patterns provide pivotal insights that not only help distinguish between legitimate operations and attempted attacks, but also drive the development of robust cybersecurity measures that effectively deter such behaviors. The nuances discovered in this study contribute significantly to IoT security by enhancing our understanding of malware tactics and informing targeted defense strategies.
キーワード
Malware analysis
IoT
Honeypot
Log analysis
Attack patterns
備考
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
This fulltext file will be available in Feb. 2026.
発行日
2023-11-27
出版物タイトル
2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
出版者
IEEE
開始ページ
292
終了ページ
297
ISSN
2832-1324
資料タイプ
会議発表論文
言語
英語
OAI-PMH Set
岡山大学
著作権者
© 2023 IEEE.
論文のバージョン
author
DOI
関連URL
isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
Citation
H. Victor, S. Kobayashi and T. Yamauchi, "Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach," 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW), Matsue, Japan, 2023, pp. 292-297, doi: 10.1109/CANDARW60564.2023.00055.
助成情報
22H03592: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )