论文标题

基于模型的框架,用于使用僵尸网络利用物联网设备的传感器:Android的案例研究

Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android

论文作者

Khaliq, Zubair, Khan, Dawood Ashraf, Baba, Asif Iqbal, Ali, Shahbaz, Farooq, Sheikh Umar

论文摘要

僵尸网络不仅成为互联网的严重安全威胁,而且对与之相关的设备也成为了严重的安全威胁。物联网的指数增长,扫地的COVID-19大流行以及现在越来越多的网络犯罪分子的数量越来越大,这些因素现在可以访问或开发出越来越复杂的工具,正在激励该域中僵尸网络的增长。最近爆​​发了诸如Dark Nexus(Qbot和Mirai),Mukashi,Leethozer,Hoxcalls等的僵尸网络爆发。显示了这种威胁融合的令人震惊的速度。僵尸网络具有使它们成为物联网设备恶意活动的绝佳平台。这些物联网设备由需要创新和维护其客户,员工和业务合作伙伴的个人和机密数据的组织使用。物联网设备具有内置的传感器或执行器,可以利用这些传感器或执行器来监视或控制与它们相关的实体的物理环境,从而违反了这些设备隐私的基本概念。在本文中,我们设计并描述了一个用于物联网的模块化僵尸网络框架。我们的框架独立于通信渠道,因为它利用各种可用的通信渠道来命令和控制物联网设备。该框架使用与新型域通量技术相关的增强的集中式体系结构。拟议的框架将提供有关如何在设计时间内合并物联网设备中的隐私,以检查这些设备中的传感器和执行器,以防止恶意剥削,从而保留隐私。本文包括设计注意事项,命令和控制结构,特征,功能,入侵和其他相关工作。此外,使用已开发的框架实现和解释了概念证明。

Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's sweeping the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent outbreak of botnets like Dark Nexus (derived from Qbot and Mirai), Mukashi, LeetHozer, Hoaxcalls, etc. shows the alarming rate at which this threat is converging. The botnets have attributes that make them an excellent platform for malicious activities in IoT devices. These IoT devices are used by organizations that need to both innovate and safeguard the personal and confidential data of their customers, employees, and business partners. The IoT devices have built-in sensors or actuators which can be exploited to monitor or control the physical environment of the entities connected to them thereby violating the fundamental concept of privacy-by-design of these devices. In this paper, we design and describe a modular botnet framework for IoT. Our framework is communication channel independent because it utilizes various available communication channels for command and control of an IoT device. The framework uses an enhanced centralized architecture associated with a novel Domain Fluxing Technique. The proposed framework will provide insights into how privacy in IoT devices can be incorporated at design time to check the sensors and actuators in these devices against malicious exploitation consequently preserving privacy. This paper includes design considerations, command and control structures, characteristics, capabilities, intrusion, and other related work. Furthermore, proof of concept Botnet is implemented and explained using the developed framework.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源