论文标题
装满针头的干草堆:野外物联网设备的可扩展检测
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild
论文作者
论文摘要
消费者的物联网(IoT)设备非常受欢迎,从语音助手到家庭用具,为用户提供了丰富而多样的功能。这些功能通常具有巨大的隐私和安全风险,最近的大规模协调全球攻击破坏了大型服务提供商。因此,解决这些风险的重要第一步是知道IoT设备在网络中的位置。尽管存在一些有限的解决方案,但一个关键的问题是,是否只能看到仅查看采样流量统计信息的Internet服务提供商可以完成设备发现。特别是,对于ISP而言,它是挑战性的,可以有效地跟踪和跟踪来自其数百万订户部署的IoT设备的活动 - 所有这些都带有采样的网络数据。 在本文中,我们开发并评估了一种可扩展的方法,以准确地检测和监视订户线路上的IoT设备,并具有有限的,高度采样的数据。我们的发现表明,在主要的ISP和IXP上,使用被动的,稀疏的采样网络流程管,在数小时内可检测和可识别数百万的物联网设备。我们的方法可以检测超过77%的研究物联网制造商的设备,包括流行的设备,例如智能扬声器。尽管我们的方法可有效地提供网络分析,但它还突出了重大的隐私后果。
Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know what IoT devices are where in a network. While some limited solutions exist, a key question is whether device discovery can be done by Internet service providers that only see sampled flow statistics. In particular, it is challenging for an ISP to efficiently and effectively track and trace activity from IoT devices deployed by its millions of subscribers --all with sampled network data. In this paper, we develop and evaluate a scalable methodology to accurately detect and monitor IoT devices at subscriber lines with limited, highly sampled data in-the-wild. Our findings indicate that millions of IoT devices are detectable and identifiable within hours, both at a major ISP as well as an IXP, using passive, sparsely sampled network flow headers. Our methodology is able to detect devices from more than 77% of the studied IoT manufacturers, including popular devices such as smart speakers. While our methodology is effective for providing network analytics, it also highlights significant privacy consequences.