Internet-scale insecurity of consumer internet of things: An empirical measurements perspective

A Mangino, MS Pour, E Bou-Harb - ACM Transactions on Management …, 2020 - dl.acm.org
The number of Internet-of-Things (IoT) devices actively communicating across the Internet is
continually increasing, as these devices are deployed across a variety of sectors, constantly …

Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective

S Torabi, E Bou-Harb, C Assi… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …

Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices

F Shaikh, E Bou-Harb, N Neshenko… - IEEE …, 2018 - ieeexplore.ieee.org
Advancements in computing, communication, and sensing technologies are making it
possible to embed, control, and gather vital information from tiny devices that are being …

Inferring and investigating IoT-generated scanning campaigns targeting a large network telescope

S Torabi, E Bou-Harb, C Assi… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The analysis of recent large-scale cyber attacks, which leveraged insecure Internet of Things
(IoT) devices to perform malicious activities on the Internet, highlighted the rise of IoT …

[HTML][HTML] A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities

S Torabi, E Bou-Harb, C Assi, M Debbabi - Forensic Science International …, 2020 - Elsevier
The analysis of large-scale cyber attacks, which utilized millions of exploited Internet of
Things (IoT) devices to perform malicious activities, highlights the significant role of …

Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Proceedings of the 14th …, 2019 - dl.acm.org
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructure realms. Several challenges impede addressing IoT …

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

J Choi, A Anwar, A Alabduljabbar, H Alasmary… - Computer Networks, 2022 - Elsevier
The lack of security measures among the Internet of Things (IoT) devices and their persistent
online connection gives adversaries a prime opportunity to target them or even abuse them …

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles

L Morgese Zangrandi, T Van Ede, T Booij… - Proceedings of the 38th …, 2022 - dl.acm.org
Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in
security measures, leading to attacks increasing every year. In particular, network …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild

J Song, S Wan, M Huang, J Liu, L Sun… - ACM Transactions on …, 2023 - dl.acm.org
With the increasing number of Internet of Things (IoT) devices connected to the internet, the
industry and research community have become increasingly concerned about their security …