Open s-hanna15 opened 4 years ago
Reviewer: Sean McBride
Review Type: Comprehension Review
There have been anecdotal reports that the number of telnet-based attacks against IOT systems have increased. What is the nature of these attacks?
Reviewer: Akinori Kahata Review type: Comprehensive
Reviewer: Alvaro Albero Review Type: Analytical
The number of attacks to IoT devices keeps increasing and many of these attacks are Telnet attacks. The authors want to understand more on how these attacks are performed and what are they targeting.
The authors perform an analysis and confirm the increasing number of Telnet attacks. First, they create a honeypot to receive this kind of attacks by simulating different IoT devices. When an attack is performed, they analyze it and capture the malware samples. Second, they propose a Box that is able to run the attacker’s commands and the captured malware for further understanding. Finally, they have organized the attacks in different families based on the actions performed, the architectures they are targeting and their goals.
Reviewer: Rick Sear Review Type: Comprehension
IoT devices often have weak or no passwords, making them vulnerable to very simple cyberattacks. This paper introduces a honeypot to draw in attackers and gain insight into their techniques, as well as provide some analysis of what they found.
The paper introduces IoTPOT, which acts like IoT devices running on various hardware architectures. Attackers enter the IoTBOX environment; their interactions are monitored by a Frontend Responder, Profiler, and Downloader to gather information about the attack and attacker.
Reviewer: Eric Wendt Review Type: Critical
Problem being solved IoTPOT describes itself as a honey-pot for gathering security analytics for IoT devices and attacks. The tools that IoTPOT provides are extended features from what already exists. Analyzing attacks threats to IoT systems is important for the sheer amount of them exist.
Main contributions
Questions
Critiques
Reviewer: Sam Frey Review Type: Critical
Problem: IoT devices often lack sufficient security to protect themselves against basic intrusion attempts. Many IoT devices continue to use weak, default login credentials, leaving themselves accessible to attackers. This makes them an easy target, and their always-on nature makes them the perfect candidates for a malicious botnet.
Important Contributions: The authors created IoTPOT, a honeypot, to attract malicious attackers and capture malware samples. With these samples, the authors can gain a better understanding of attacks against IoT devices, and thus, a better idea of how to protect them. With IoTPOT, the authors were able to identify 4 distinct families of malware attacking IoT devices.
Questions:
Critique: While the paper is well written and easy to understand, it lacks substance. The authors did a great job of explaining what they did, but not so much how they did it. I do recognize that this may be an intentional decision though. As Rick (@searri) brought up, publishing this paper makes it available to attackers as well. Too much detail on implementation could render IoTPOT useless.
Reviewer: Reese Jones Review Type: Critical
Problem Bring Solved: Even though there have been advancements in security for General Purpose Computers and other "normal" devices, IoT Hardware consistently relies on security techniques which leaves them open to compromise and attack. The systems are often so insecure they are run off of basic default/no password protection and are therefore vulnerable to some of the most basic intrusion attacks available.
Main Contributions: The paper discusses IoTPOT, a honeypot created by the authors which is meant to lure in any potential attackers. On top of that IoTPOT is meant to help used those lured in attackers to grab information about attacks in order to better understand the security threats facing IoT devices.
Questions
What exactly is the technology behind identifying attacks? I felt as though that was not discussed enough.
Is Telnet as much an attack vector today as it was when the paper was published? A quick google search did not yield an IoT and Telnet article dated after 2016.
What about Telnet made it the -in my reading- most significant attack vector in the whole paper? As in why is it such a risk.
Critiques
Through reading this my main critique lies with the fact the paper exists at all, doesn't having this information out there in any capacity completely negate the purpose of developing and designing the IoTPOT system?
Just as mentioned in my questions, if they're going into so much detail re: the IoTPOT system already I would have liked to see more about how attacks are monitored and cataloged.
Reviewer: Rachell Kim Review Type: Comprehension
Problem Being Solved:
There has been an increase in DDoS attacks on Telnet-based IoT devices since 2014. This issue prompted the need to analyze and study how IoT devices are being compromised by different types of malware.
Main Contribution:
The authors propose a honeypot called IoTPOT to simulate IoT devices and capture details of Telnet-based attacks. Moreover, they also propose and utilize a backend virtual environment called IoTBOX to execute captured malware and perform analysis. From the results, the authors have been able to identify different families of malware and certain characteristics of their behaviors.
Questions:
Reviewer: Alex Jacobson Review Type: Critical
Summary of problem being solved:
The threats against IOT devices are increasing. The authors design honeypot and sandbox in order to attract these attacks to analyze them.
Main contributions:
The authors are kind enough to summarize their own contributions. They detect a large increase in the number Telnet based attacks and the involvement of IOT devices. They propose a Honeypot to analyze those attacks, and they also propose IOT-box to run the malware on different cpu architectures in order to further analyze the attacks.
Questions: What is Telnet? Seems like some communication protocol, but I do not know what exactly it is. What is a darknet? I believe the illegal online drug marketplaces are hosted on the dark web. Are darknet and dark web equivalent? What is 23/TCP? Is it a port? Not entirely clear on that.
Critiques:
The paper uses a lot of vocabulary that I am not familiar with. Perhaps i’m just unprepared to read this paper, but a bit of background would have been nice. For example, I do not know exactly what a honeypot is, as it is used in this paper. I eventually inferred that it is liked honey too bees, trying to attract the attacks in order to analyze them, but overall more background would have been nice.
The authors use a device to attract attacks and analyze them. They learned that there are at least four DDoS malware families targeting IOT devices. While this is nice to know, what is the significance? What can we do with that knowledge in order to prevent attacks? Would have been good to discuss that.