Sunteți pe pagina 1din 4

SECTION TITLE

CYBERTRUST

Botnets and Internet


of Things Security
Elisa Bertino, Purdue University
Nayeem Islam, Qualcomm

Recent distributed denial-of-service attacks industrial control systems. In Janu-


ary 2014, a variant of the worm was
demonstrate the high vulnerability of Internet found to include a cryptocurrency
mining tool.1
of Things (IoT) systems and devices. Addressing In September 2016, an IoT botnet
built from the Mirai malware2—
this challenge will require scalable security perhaps the largest botnet on
solutions optimized for the IoT ecosystem. record 3—was responsible for a 600-
Gbps attack targeting Brian Krebs’s

T
security blog (krebsonsecurity
he large number of insecure Internet of Things .com). Mirai’s strategy is quite simple; it uses a list of 62
(IoT) devices with high computation power common default usernames and passwords to gain ac-
make them an easy and attractive target for cess primarily to home routers, network-enabled cam-
attackers seeking to compromise these devices eras, and digital video recorders, which usually have less
and use them to create large-scale botnets. A botnet is a robust protection than other consumer IoT devices. The
network of infected machines or bots, also called zom- same month, a Mirai-based attack against the French
bies, that has a command-and-control infrastructure webhost OVH broke the record for the largest recorded
and is used for various malicious activities such as dis- DDoS attack—at least 1.1 Tbps, and perhaps as large as
tributed denial-of-service (DDoS) attacks (see the “Bot- 1.5 Tbps.4
nets” sidebar).
In November 2013, Symantec researchers discovered IOT SECURITY RISKS
the Linux.Darlloz worm, which exploited a PHP vulner- These DDoS attacks weren’t a surprise. Compared to con-
ability to propagate to IoT devices such as home rout- ventional computing systems, IoT systems are at higher
ers, TV set-top boxes, security cameras, printers, and security risk for several reasons:5

76 COM PUTE R PUBLISHED BY THE IEEE COMPUTER SOCIET Y 0 0 1 8 - 9 1 6 2 / 1 7/ $ 3 3 .0 0 © 2 0 1 7 I E E E


EDITOR
EDITORJEFFREY
EDITOR NAME
VOAS
NIST; j.voas@ieee.org
Affiliation;

› IoT systems don’t have well-


defi ned perimeters and contin-
uously change due to device and BOTNETS
user mobility.
› IoT systems are highly hetero-
geneous with respect to commu-
nication medium and protocols,
A botnet is a robot network of compromised machines, or bots, that run ma-
licious software under the command and control of a botmaster. Botnets
have a wide range of nefarious purposes including email spam delivery, distrib-
platforms, and devices. uted denial-of-service (DDoS) attacks, password cracking, key logging, and crypto
› IoT devices could be autonomous currency mining.
entities that control other IoT Bots can automatically scan entire network ranges and propagate themselves
devices. using known vulnerabilities and weak passwords on other machines. Once a
› IoT systems might include machine is compromised, a small program is installed for future activation by the
“things” not designed to be con- botmaster, who at a certain time can instruct the bots in the network to execute
nected to the Internet. actions such as sending requests to a target website with the intent of rendering it
› IoT systems, or portions of them, unable to serve requests by legitimate users, resulting in DDoS.
could be physically unprotected Early botnets used a centralized architecture in which the botmaster would
and/or controlled by different reside on one or more central servers. Because such botnets could be disabled
parties. by shutting down these servers, alternative architectures based on peer-to-peer
› Unlike smartphone applications, (P2P) networks emerged. Example P2P botnets include GameOver Zeus, Sality,
which require permission for ZeroAccess, and Kelihos.
installation and many user inter- As communication is a critical botnet function, domain fluxing is widely used.
actions, granular permission In domain fluxing, each bot independently computes a list of pseudorandom
requests might not be possible in domain names using a domain-generation algorithm. The bot then attempts to
IoT systems because of the large contact the domains in a certain order until one attempt is successful—that is, the
number of devices. domain name resolves to an IP address and the corresponding server provides a
valid reply according to the botnet’s protocol. The botmaster, however, need only
Consequently, many IoT systems register a few domains in the list to serve as command-and-control servers.
lack even elementary security. Table 1
lists the most common IoT vulnerabil-
ities identified by the Open Web Appli-
cation Security Project (OWASP; www
.owasp.org). A July 2014 report on IoT provides a comprehensive list of such malware by using this port to
device security by HP found, on aver- practices, which include: send results to the threat actor.
age, 25 vulnerabilities per device. For
example, 80 percent of devices failed › ensuring that all default pass- The US-CERT alert also recommends
to require passwords of sufficient words are changed to strong specific end-user actions such as only
complexity and length, 70 percent passwords; acquiring IoT devices from companies
didn’t encrypt local and remote traffic › updating IoT devices with secu- with a good security reputation and
communications, and 60 percent con- rity patches; understanding the devices’ communi-
tained vulnerable user interfaces and/ › disabling Universal Plug and cation capabilities, as they’re at higher
or vulnerable fi rmware.6 Play (UPnP) on routers unless risk of malware infection.
absolutely necessary; These security practices are rea-
PROTECTION TECHNIQUES › monitoring IP ports 2323/TCP sonable and would provide a first line
Ensuring that IoT devices aren’t ex- and 23/TCP for attempts to gain of defense, but their application is
ploited as zombies requires adopting a unauthorized control over IoT clearly limited by the scalability of hu-
few well-known security practices that devices using the network termi- man interaction with IoT devices. Ap-
address the most common vulnerabil- nal (Telnet); and proaches are also needed that automat-
ities. An October 2016 alert by the US › monitoring for anomalous ically manage security for such devices.
Computer Emergency Readiness Team traffic on port 48101, as infected Another challenge of IoT devices is
(US-CERT) about the Mirai botnet4 devices often attempt to spread that even if they have known software

FEBRUARY 2017 77
CYBERTRUST

TABLE 1. Common Internet of Things vulnerabilities.*


Vulnerability Examples
Insecure web/mobile/cloud interface Inability to change default usernames and passwords; weak passwords; lack of
robust password recovery mechanisms; exposed credentials; lack of account lockout;
susceptibility to cross-site scripting, cross-site request forgery, and/or SQL injection

Insufficient authentication/ Privilege escalation; lack of granular access control


authorization

Insecure network services Vulnerability to denial-of-service, buffer overflow, and fuzzing attacks; network ports
or services unnecessarily exposed to the Internet

Lack of transport encryption/integrity Transmission of unencrypted data and credentials


verification

Privacy concerns Collection of unnecessary user data; exposed personal data; insufficient controls on
who has access to user data; sensitive data not de-identified or anonymized; lack of data
retention limits

Insufficient security configurability Lack of granular permissions model; inability to separate administrators from users;
weak password policies; no security logging; lack of data encryption options; no user
notification of security events

Insecure software/firmware Lack of secure update mechanism; update files not encrypted; update files not verified
before upload; insecure update server; hardcoded credentials

Poor physical security Device easy to disassemble; access to software via USB ports; removable storage media

*Table adapted from www.owasp.org/index.php/Top_IoT_Vulnerabilities.

vulnerabilities, patches or work- the physical environment, attacks to Network behavior analysis (NBA)
arounds might not be downloaded for such systems and devices could result programs—which can be installed
a very long period of time. Under these in major safety risks and endanger hu- and operated by administrators or
conditions, intrusion-detection tech- man life. Devising IoT-specific security provided by third-party services—
niques become even more important. techniques must be a research priority. continuously monitor data flows from
In addition, as many of the devices Defenses against conventional bot- routers and other sources and flag de-
themselves might not have power- nets can be broadly categorized into partures from established baselines
ful processors or sufficient memory, prevention, monitoring, and response. for traffic volume, bandwidth use, pro-
the intrusion-​​​d etection analysis will Preventing bot infections is the tocol use, and other metrics. Users can
likely occur at a gateway device. most effective defense. This can be ac- also take a more active role in threat
complished through antivirus software detection by reporting typical ma-
A LONGER-TERM IoT complemented by intrusion-​prevention chine infection signs such as longer
SECURITY STRATEGY systems, firewalls, content filtering and start-up or shut-down times, frequent
Mirai is just the first of a novel cate- inspection technologies, and applica- crashes, unexplained error messages,
gory of botnets that exploit IoT devices tion whitelisting. User awareness is and unusually slow operation.
and systems. Unfortunately, as history also critical, as malware often spreads If signs of a potential DDoS attack
shows, the deployment of defenses because of user mistakes, such as click- or infected machine are detected, a
against a given security threat is soon ing on email attachments. For exam- prompt response is critical to mini-
followed by new attack methods, such ple, Locky, a recent ransomware strain mize damage and prevent the malware
as recent DDoS amplification attacks that also recruited infected machines from spreading. Responses can vary
that use spoofed source IP addresses to into a botnet, was distributed via a from simple actions such as discon-
make it difficult for defenders to trace large-scale email spam campaign.8 necting a suspect machine from the
the attack’s origin.7 Thus, we can soon However, machines can become network to tracking, analyzing, and
expect more sophisticated attacks infected despite the use of security taking down botnets. NBA tools can
than Mirai with even more devastating techniques. It’s therefore critical to carry out some mitigation actions—for
consequences. In particular, because monitor network and device behavior example, they can redirect potentially
many IoT systems and devices have for anomalous events or trends that malicious traffic to other hosts using
actuation capabilities and can modify might indicate the presence of a threat. the Border Gateway Protocol or similar

78 COMPUTER  W W W.CO M P U T E R .O R G /CO M P U T E R


A
routing mechanisms. However, ad- lthough most IoT systems are to Attack,” press release, HP Inc., 29
vanced actions such as disabling a closed and tailored to specific July 2014; www8.hp.com/us/en
botnet might require the involvement applications, such systems /hp-news/press-release.html
of specialized security companies or pose formidable security challenges ?id=1744676#.WEWz17IrKos.
law-enforcement agencies. because of the large number and di- 7. J. Krupp, M. Backes, and C. Rossow,
Deploying these various defenses versity of devices, communication “Identifying the Scan and Attack
won’t be trivial given the large num- media, communication protocols, and Infrastructures behind Amplifica-
ber of IoT devices and their inherent software. So even testing IoT systems tion DDoS Attacks,” Proc. 2016 ACM
vulnerabilities. It’s thus essential to might be very difficult. In addition to SIGSAC Conf. Computer and Comm.
extend existing security mechanisms scalability and interoperability issues, Security (CCS 16), 2016, pp. 1426–1437.
such as encryption, authentication, IoT ecosystems contain many different 8. Symantec Security Response, “Locky
access control, network security, and parties, each performing security-​ Ransomware on Aggressive Hunt
application security to fit the IoT eco- relevant functions—assigning iden- for Victims,” Symantec Corp., 18 Feb.
system. For example, techniques and tifiers to IoT devices, patching device 2016; www.symantec.com/connect
tools are needed to analyze firmware software, and so on. Keeping track of /blogs/locky-ransomware-aggressive
for flaws such as authentication by- information, such as device crypto-​ -hunt-victims.
pass back doors.9 Devising methods graphic keys and who is responsible 9. Y. Shoshitaishvili et al., “Firmalice—
for discovering, identifying, and mon- for which security aspects of devices, Automatic Detection of Authentica-
itoring IoT devices is also critical. For in massive distributed systems with tion Bypass Vulnerabilities in Binary
example, the adoption of stronger multiple security/administration do- Firmware,” Proc. 2015 Network and Dis-
passwords and/or a whitelist of ad- mains is complex and yet critical. tributed System Security Symp. (NDSS
dresses from which it’s possible to log 15), 2015; www.lastline.com/papers
into IoT devices and to which IoT de- /2015_ndss15_firmalice-2.pdf.­
vices can send traffic would have pre- REFERENCES
vented the exploitation of such devices 1. S.K. Bansal, “Linux Worm Targets
by the Mirai botnet. Internet-Enabled Home Appliances to
However, understanding which Mine Cryptocurrencies,” The Hacker
combination of techniques and tools News, 19 Mar. 2014; thehackernews
should be used to protect IoT systems .com/2014/03/linux-worm-targets
is challenging due to the wide diversity -internet-enabled.html. ELISA BERTINO is a professor
of IoT applications and scenarios. In 2. D. Goodin, “Record-Breaking DDoS of computer science and a cour-
addition, the selection might depend Reportedly Delivered by >145K tesy professor of electrical and
on the processes in place for manag- Hacked Cameras,” Ars Technica, 28 computer engineering at Purdue
ing software. It’s reasonable to assume Sept. 2016; arstechnica.com/security University, where she is also di-
that companies creating IoT devices /2016/09/botnet-of-145k-cameras rector of the Cyber Space Security
for privacy-sensitive or safety-critical -reportedly-deliver-internets-biggest Lab (Cyber2Slab). Contact her at
applications would perform firmware -ddos-ever. ­bertino@purdue.edu.
analysis, but many companies in the 3. “KrebsOnSecurity Hit with Record
consumer IoT space might not do so. DDoS,” blog, 21 Sept. 2016; NAYEEM ISLAM is a vice president
Thus, a security strategy must also in- krebsonsecurity.com/2016/09 and head of corporate research
clude a thorough risk assessment. /krebsonsecurity-hit-with-record-ddos. and development at Qualcomm
An important advantage to keep 4. US Computer Emergency Readiness Research Silicon Valley. Contact him
in mind, however, is that many of Team, “Heightened DDoS Threat at ­nayeem.islam@gmail.com.
today’s IoT devices have specialized Posed by Mirai and Other Botnets,”
functions with very limited input, alert TA16-288A, 14 Oct. 2016 (re-
and thus they behave quite predict- vised 30 Nov. 2016); www.us-cert
ably. This makes it easier to establish .gov/ncas/alerts/TA16-288A.
baseline actions within monitoring 5. E. Bertino, “Data Security and Pri-
tools to detect anomalies that could vacy in the IoT,” Proc. 19th Int’l Conf.
indicate potential attacks or com- Extending Database Technology (EDBT
promised devices. To keep such an 16), 2016; openproceedings.org/2016 Read your subscriptions
approach scalable, such monitoring /conf/edbt/paper-a.pdf. through the myCS
publications portal at
activities could be carried out by IoT 6. “HP Study Reveals 70 Percent of In-
http://mycs.computer.org
routers or gateways. ternet of Things Devices Vulnerable

FEBRUARY 2017 79

S-ar putea să vă placă și