このエントリーをはてなブックマークに追加
ID 68935
Author
Victor, Hervet Okayama University
Kobayashi, Satoru Faculty of Environmental, Life, Natural Science and Technology, Okayama University
Yamauchi, Toshihiro Faculty of Environmental, Life, Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Abstract
With the continuous proliferation of Internet of Things (IoT) devices, malware threats that specifically target these devices continue to increase. The urgent need for robust security measures is predicated on a comprehensive understanding of the behavioral patterns of IoT malware. However, previous studies have often overlooked the analysis of command sequences in Telnet logs. This study bridges this research gap by examining the post-injection behaviors of attackers. By analyzing a vast dataset comprising more than ten million logs collected from an IoT honeypot, we reveal three distinct post-injection activity patterns, each with unique characteristics. These patterns provide pivotal insights that not only help distinguish between legitimate operations and attempted attacks, but also drive the development of robust cybersecurity measures that effectively deter such behaviors. The nuances discovered in this study contribute significantly to IoT security by enhancing our understanding of malware tactics and informing targeted defense strategies.
Keywords
Malware analysis
IoT
Honeypot
Log analysis
Attack patterns
Note
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
This fulltext file will be available in Feb. 2026.
Published Date
2023-11-27
Publication Title
2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher
IEEE
Start Page
292
End Page
297
ISSN
2832-1324
Content Type
Conference Paper
language
English
OAI-PMH Set
岡山大学
Copyright Holders
© 2023 IEEE.
File Version
author
DOI
Related Url
isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
Citation
H. Victor, S. Kobayashi and T. Yamauchi, "Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach," 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW), Matsue, Japan, 2023, pp. 292-297, doi: 10.1109/CANDARW60564.2023.00055.
助成情報
22H03592: 機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究 ( 独立行政法人日本学術振興会 / Japan Society for the Promotion of Science )