论文标题
针对Mirai Botnet进行测试和硬化的IoT设备
Testing And Hardening IoT Devices Against the Mirai Botnet
论文作者
论文摘要
绝大多数廉价的物品互联网(IoT)设备全新到达,并配备了开箱即用的设置,没有由制造商来确保,并且容易受到互联网上潜伏的恶意软件的影响。其中包括Mirai僵尸网络,其源代码已泄漏到世界上,使任何恶意演员都可以配置并释放它。没有安全有效地利用软件资产的组合正在使消费者充分妥协。我们使用Mirai库配置并攻击了4种不同的物联网设备。我们的实验得出的结论是,四个设备中的三个容易受到Mirai恶意软件的影响,并在使用其默认配置部署时被感染。这表明原始的安全配置不足以为消费者提供可接受的保护水平,使其设备暴露和脆弱。通过分析Mirai库及其攻击向量,我们能够确定适当的设备配置对策,以将设备与此僵尸网络相抵触,这些设备通过实验成功验证。
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufactures, and are vulnerable to existing malware lurking on the Internet. Among them is the Mirai botnet which has had its source code leaked to the world, allowing any malicious actor to configure and unleash it. A combination of software assets not being utilised safely and effectively are exposing consumers to a full compromise. We configured and attacked 4 different IoT devices using the Mirai libraries. Our experiments concluded that three out of the four devices were vulnerable to the Mirai malware and became infected when deployed using their default configuration. This demonstrates that the original security configurations are not sufficient to provide acceptable levels of protection for consumers, leaving their devices exposed and vulnerable. By analysing the Mirai libraries and its attack vectors, we were able to determine appropriate device configuration countermeasures to harden the devices against this botnet, which were successfully validated through experimentation.