论文标题
针对Iot的网络攻击的评估:实验评估
Evaluation of Cyber Attacks Targeting Internet Facing IoT : An Experimental Evaluation
论文作者
论文摘要
21世纪信息和通信技术(ICT)的快速增长导致出现了一种新型的技术范式。被称为物联网或物联网。该物联网是当今智能基础架构的核心,它通过简化智能数字设备之间的互连并使机器(M2M)通信之间的互连来帮助创建无处不在的事物网络。截至目前,有许多可用的物联网用例的例子,可以帮助世界上每个人的生活更轻松,更方便。随着物联网在各种网络攻击方面的最新进步,这些网络攻击针对这些普遍的物联网环境,甚至可能导致人们的生活危害;涉及它。通常,该物联网可以被视为连接到Internet进行互通的每个数字对象。因此,在这方面为了分析通过互联网产生的网络威胁,在这里,我们正在进行实验评估来分析该请求,以利用IoT设备的打开的安全壳(SSH)连接服务,在我们的情况下,它是Raspberry Pi设备,该设备连续六个以上连接了互联网。通过在Raspberry Pi上打开SSH服务,它可以充当蜜罐设备,我们可以在其中记录并检索收到的所有登录尝试请求。启发是通过评估针对普遍物联网环境中对象的IoT安全攻击的启发,在检索了通过开放SSH连接提出的所有登录请求之后,我们随后提供了全面的分析,以及我们对请求的起源和入侵者焦点领域的观察结果;在这项研究中。
The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. With the latest advancement of IoT in variety of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of peoples; that are involving with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard in order to analyse cyber threats that come through the Internet, here we are doing an experimental evaluation to analyse the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests that made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.