Analysis of commands of Telnet logs illegally connected to IoT devices

Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Mirai is an active malware that targets and poses constant threats to IoT devices. IoT malware penetrates IoT devices illegally, makes them download other malware such as bots, and infects them. Therefore, to improve the security of IoT devices, it is important to analyze the behaviors of IoT malware and take countermeasures. In this study, to analyze the behaviors of IoT malware after entering IoT devices and propose new security functions for operating systems to prevent activities such as IoT malware infection, we analyze Telnet logs collected by a honeypot of IoT devices. Thereafter, we report the analysis results regarding IoT malware input commands. The results show that many commands related to shell execution, file download, changing file permissions, and file transfer, are often executed by IoT malware.

Original languageEnglish
Title of host publicationProceedings - 2021 10th International Congress on Advanced Applied Informatics, IIAI-AAI 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages913-915
Number of pages3
ISBN (Electronic)9781665424202
DOIs
Publication statusPublished - 2021
Event10th International Congress on Advanced Applied Informatics, IIAI-AAI 2021 - Virtual, Online, Japan
Duration: Jul 11 2021Jul 16 2021

Publication series

NameProceedings - 2021 10th International Congress on Advanced Applied Informatics, IIAI-AAI 2021

Conference

Conference10th International Congress on Advanced Applied Informatics, IIAI-AAI 2021
Country/TerritoryJapan
CityVirtual, Online
Period7/11/217/16/21

Keywords

  • IoT
  • malware
  • Telnet log

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management
  • Education

Fingerprint

Dive into the research topics of 'Analysis of commands of Telnet logs illegally connected to IoT devices'. Together they form a unique fingerprint.

Cite this