권호기사보기
기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
---|
대표형(전거형, Authority) | 생물정보 | 이형(異形, Variant) | 소속 | 직위 | 직업 | 활동분야 | 주기 | 서지 | |
---|---|---|---|---|---|---|---|---|---|
연구/단체명을 입력해주세요. |
|
|
|
|
|
* 주제를 선택하시면 검색 상세로 이동합니다.
최근 컴퓨팅 및 통신 기술의 발달로 인해 IoT 디바이스가 급격히 확산‧보급되고 있다. 특히 IoT 디바이스는 가정에서부터 공장에 이르기까지 그 목적에 따라 연산을 수행하거나 주변 환경을 센싱하는 등의 기능을 보유하고 있어 실생활에서의 활용이 폭넓게 증가하고 있다. 하지만, 제한된 수준의 하드웨어 자원을 보유한 IoT 디바이스는 사이버공격에 노출되는 위험도가 높으며, 이로 인해 IoT 봇넷은 악성행위의 경유지로 악용되거나 연결된 네트워크로 감염을 빠르게 확산함으로써 단순한 정보 유출뿐만 아니라 범국가적 위기를 초래할 가능성이 존재한다. 본 논문에서는 폭넓게 활용되고 있는 IoT 네트워크에서 알려지지 않은 보안위협에 선제적으로 대응하기 위해 IoT 봇넷의 네트워크 행위특징을 활용한 선제탐지 방법을 제안한다. IoT 봇넷이 접근하는 다크넷 트래픽을 분석하여 4가지 행위특징을 정의하고 이를 통해 감염의심 IP를 빠르게 선별한다. 분류된 IP는 사이버 위협 인텔리전스(CTI)를 활용하여 알려지지 않은 의심 호스트 여부를 확인한 후, 디바이스 핑거프린팅을 통해 IoT 봇넷에의 소속 여부를 최종 결정한다. 제안된 선제탐지 방법의 유효성 검증을 위해 실제 운용 중인 보안관제 환경의 다크넷 대역에 방법론 적용 및 확인 결과, 선제탐지 한 약 1,000개의 호스트가 실제 악성 IoT 봇넷임을 10개월간 추적관찰로 검증하여 그 유효성을 확인하였다.
With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.번호 | 참고문헌 | 국회도서관 소장유무 |
---|---|---|
1 | D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V. Poor, “6G Internet of Things: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359-383, Aug. 2021. | 미소장 |
2 | D. Minoli, K. Sohraby, and B. Occhiogrosso, “IoT considerations, requirements, and architectures for smart buildings—Energy optimization and next-generation building management systems,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 269-283, Jan. 2017. | 미소장 |
3 | K. Ogawa, K. Kanai, K. Nakamura, H. Kanemitsu, J. Katto, and H. Nakazato, “IoT device virtualization for efficient resource utilization in smart city IoT platform,” 2019 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 419-422, Mar. 2019. | 미소장 |
4 | N. Y. Philip, J. J. P. C. Rodrigues, H. Wang, S. J. Fong, and J. Chen, “Internet of Things for In-Home Health Monitoring Systems: Current Advances, Challenges, and Future Directions,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 300-310, Jan. 2021. | 미소장 |
5 | A. H. Anwar, N. O. Leslie, and C. A. Kamhoua, "Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems," 2021 IEEE Military Communications Conference, pp. 1005-1010 , Nov. 2021. | 미소장 |
6 | A. Shamayleh, M. Awad, and J. Farhat, "IoT based predictive maintenance management of medical equipment," Journal of Medical Systems, vol. 44, no. 4, pp. 1-12, Feb. 2020. | 미소장 |
7 | C. Shao, H. Roh, and W. Lee, “Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives,” Journal of Network and Computer Applications, vol.128, no.1 pp. 23-31, Dec. 2018. | 미소장 |
8 | F. Chen, D. Luo, T. Xiang, P. Chen, J. Fan, and H.-L. Truong, “IoT cloud security review: A case study approach using emerging consumer- oriented applications,” ACM Computing Surveys, vol. 54, no. 4, pp. 1-36, May. 2022. | 미소장 |
9 | J. Kim and W. Lee, “Feasibility Study of 60 GHz Millimeter-Wave Technologies for Hyperconnected Fog Computing Applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1165-1173, Oct. 2017. | 미소장 |
10 | A. Augustin, J. Yi, T. Clausen, W. M. Townsley, “A study of LoRa: Long range & low power networks for the internet of things.” Sensors, vol. 16, no. 9, pp. 1-18, Sep. 2016. | 미소장 |
11 | C. Shao, O. Muta, W. Wang, and W. Lee, “Toward Ubiquitous Connectivity via LoRaWAN: An Overview of Signal Collision Resolving Solutions,” IEEE Internet of Things Magazine, vol. 4, no. 4, pp. 114-119, Dec. 2021. | 미소장 |
12 | R. K. Jha, Puza, H. Kour, Manoj Kumar, and Shubha Jain, “Layer based security in narrow band Internet of Things (NB-IoT),” Computer Networks, vol. 185, Feb. 2021. | 미소장 |
13 | I. Choi, J. Lee, T. Kwon, K. Kim, Y. Choi, and J. Song, “An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring,” 2021 16th Asia Joint Conference on Information Security, pp. 1-8, Aug. 2021. | 미소장 |
14 | Y. Lee, H. Moon, G. Park, T. Kim, and J. Song, “Trends on cyber threats and their countermeasure technologies in COVID-19,” Review of KIISC, 31(5), pp. 5-12 , Oct. 2021. | 미소장 |
15 | M. Antonakakis et al., “Understanding the mirai botnet,”" 26th USENIX Security Symposium, pp. 1093-1110, Aug. 2017. | 미소장 |
16 | B. Vignau, R. Khoury, and S. Hallé, “10 years of IoT malware: A feature-based taxonomy,” 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, pp. 458-565, Jul. 2019. | 미소장 |
17 | J. Sahota and N. Vlajic, "Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations," 2021 International Conference on Computational Science and Computational Intelligence, pp. 698-703, Dec. 2021. | 미소장 |
18 | B. Stephens, A. Shaghaghi, R. Doss, and S. S. Kanhere, “Detecting Internet of Things Bots: A Comparative Study,” IEEE Access, vol. 9, pp. 160391-160401, Nov. 2021. | 미소장 |
19 | Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, ‘‘IoTPOT: A novel honeypot for revealing current IoT threats,’’ Journal of Information Processing, vol. 24, no. 3, pp. 522-533, May 2016. | 미소장 |
20 | J. D. Guarnizo, A. Tambe, S. S. Bhunia, M. Ochoa, N. O. Tippenhauer, A. Shabtai, Y. Elovici, “Siphon: Towards scalable high- interaction physical honeypots,“ 3rd ACM Workshop on Cyber-Physical System Security, pp. 57-68, Apr. 2017. | 미소장 |
21 | Meidan, Yair, et al. “N-baiot—network-based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, Dec. 2018. | 미소장 |
22 | Nishijima, Katsuya, et al. “Verification of the Effectiveness to Monitor Darknet across Multiple Organizations,” 2021 Ninth International Symposium on Computing and Networking Workshops, pp. 346-351, Nov. 2021. | 미소장 |
23 | J. Park, T. Kwon, Y. Lee, S. Choi, and J. Song, “A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic,” Journal of the Korea Institute of Information Security and Cryptology, 27(4), pp. 821-830, Aug. 2017. | 미소장 |
24 | K.-I. Kim, S.-S. Choi, H.-S. Park, S.-J. Ko, and J.-S. Song, “A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response,” Journal of the Korea Institute of Information Security and Cryptology, 24(6), pp. 1185-1195, Dec. 2014. | 미소장 |
25 | S. Torabi, E. Bou-Harb, C. Assi, M. Galluscio, A. Boukhtouta, and M. Debbabi, “Inferring, characterizing, and investigating internet-scale malicious IoT device activities: A network telescope perspective,” 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 562-573, Jun. 2018. | 미소장 |
26 | F. Shaikh, E. Bou-Harb, N. Neshenko, A. P. Wright, and N. Ghani, “Internet of Malicious Things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited IoT devices,” IEEE Communications Magazine, vol. 56, no. 9, pp. 170-177, Sep. 2018. | 미소장 |
27 | M. S. Pour, D. Watson, and E. Bou-Harb, “Sanitizing the iot cyber security posture: An operational cti feed backed up by internet measurements,” 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 497-506, Jun. 2021. | 미소장 |
28 | F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, “IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8182-8201, Oct. 2019. | 미소장 |
29 | B. D. Davis, J. C. Mason, and M. Anwar, “Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10102-10110, Oct. 2020. | 미소장 |
30 | Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features,” Electronics, vol. 9, no. 1, pp. 1-19, Jan. 2020. | 미소장 |
31 | L. G. Greenwald and T. J. Thomas, “Toward undetected operating system fingerprinting,” 1st USENIX Workshop on Offensive Technologies, pp. 1-10, Aug. 2007. | 미소장 |
32 | VirusTotal, "Malware and URL Scanner", https://www.virustotal.com, 8. 25. 2022. | 미소장 |
33 | AlienVault, "Open Threat Exchange", https://otx.alienvault.com, 8. 25. 2022. | 미소장 |
*표시는 필수 입력사항입니다.
*전화번호 | ※ '-' 없이 휴대폰번호를 입력하세요 |
---|
기사명 | 저자명 | 페이지 | 원문 | 기사목차 |
---|
번호 | 발행일자 | 권호명 | 제본정보 | 자료실 | 원문 | 신청 페이지 |
---|
도서위치안내: 정기간행물실(524호) / 서가번호: 국내09
2021년 이전 정기간행물은 온라인 신청(원문 구축 자료는 원문 이용)
우편복사 목록담기를 완료하였습니다.
*표시는 필수 입력사항입니다.
저장 되었습니다.