Hwang Song-Yi, Kim Jeong-Nyeo
Department of Information Security Engineering, University of Science and Technology (UST), Daejeon 34113, Korea.
Electronics and Telecommunications Research Institute, Daejeon 34129, Korea.
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.
随着物联网(IoT)的扩展,利用物联网设备漏洞的安全事件日益突出。然而,由于物联网设备具有低功耗和低性能等特点,难以将现有的安全解决方案应用于物联网设备。因此,物联网设备很容易成为网络攻击者的目标,针对物联网设备的恶意软件攻击逐年增加。最具代表性的是Mirai恶意软件,它通过创建大规模物联网僵尸网络引发分布式拒绝服务(DDoS)攻击。此外,Mirai恶意软件已在互联网上发布,导致变种和新恶意代码不断增加。减轻分布式拒绝服务攻击的方法之一是通过防止恶意代码传播,使大规模物联网僵尸网络难以创建。对于物联网基础设施安全,正在研究安全解决方案,以分析进出物联网基础设施的网络数据包来检测威胁,并通过动态控制对恶意使用的物联网设备、网络设备和物联网服务的网络访问,防止威胁在物联网基础设施内传播。然而,将未经验证的安全解决方案应用于实际环境存在很大风险。在本文中,我们提出了一种恶意软件模拟工具,该工具扫描分配有私有IP地址的易受攻击的物联网设备,并通过向易受攻击的设备注入恶意代码下载命令,在物联网基础设施内传播恶意代码。本文提出的恶意软件模拟工具可用于验证网络威胁检测和预防解决方案的功能。