학술논문

Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach
Document Type
Conference
Source
2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) CANDARW Computing and Networking Workshops (CANDARW), 2023 Eleventh International Symposium on. :292-297 Nov, 2023
Subject
Computing and Processing
Bridges
Conferences
Drives
Malware
Behavioral sciences
Internet of Things
Cyberattack
Malware analysis
IoT
Honeypot
Log analysis
Attack patterns
Language
ISSN
2832-1324
Abstract
With the continuous proliferation of Internet of Things (IoT) devices, malware threats that specifically target these devices continue to increase. The urgent need for robust security measures is predicated on a comprehensive understanding of the behavioral patterns of IoT malware. However, previous studies have often overlooked the analysis of command sequences in Telnet logs. This study bridges this research gap by examining the post-injection behaviors of attackers. By analyzing a vast dataset comprising more than ten million logs collected from an IoT honeypot, we reveal three distinct post-injection activity patterns, each with unique characteristics. These patterns provide pivotal insights that not only help distinguish between legitimate operations and attempted attacks, but also drive the development of robust cybersecurity measures that effectively deter such behaviors. The nuances discovered in this study contribute significantly to IoT security by enhancing our understanding of malware tactics and informing targeted defense strategies.