skip to main content
research-article

Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild

Published:19 October 2023Publication History
Skip Abstract Section

Abstract

With the increasing number of Internet of Things (IoT) devices connected to the internet, the industry and research community have become increasingly concerned about their security impact. Adversaries or hackers often exploit public security flaws to compromise IoT devices and launch cyber attacks. However, despite this growing concern, little effort has been made to investigate the detection of IoT devices and their underlying risks. To address this gap, this article proposes to automatically establish relationships between IoT devices and their vulnerabilities in the wild. Specifically, we construct a deep neural network (DNN) to extract semantic information from IoT packets and generate fine-grained fingerprints of IoT devices. This enables us to annotate IoT devices in cyberspace, including their device type, vendor, and product information. We collect vulnerability reports from various security sources and extract IoT device information from these reports to automatically match vulnerabilities with the fingerprints of IoT devices. We implemented a prototype system and conducted extensive experiments to validate the effectiveness of our approach. The results show that our DNN model achieved a 98% precision rate and a 95% recall rate in IoT device fingerprinting. Furthermore, we collected and analyzed over 13,063 IoT-related vulnerability reports and our method automatically built 5,458 connections between IoT device fingerprints and their vulnerabilities. These findings shed light on the ongoing threat of cyber-attacks on IoT systems as both IoT devices and disclosed vulnerabilities are targets for malicious attackers.

REFERENCES

  1. [1] Aksoy Ahmet and Gunes Mehmet Hadi. 2019. Automated iot device identification using network traffic. In Proceedings of the IEEE International Conference on Communications (ICC’19). IEEE, 17.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi. 2017. Internet of things security: A survey. Journal of Network and Computer Applications 88 (2017), 10–28.Google ScholarGoogle Scholar
  3. [3] Antonakakis Manos, April Tim, Bailey Michael, Bernhard Matthew, Bursztein Elie, Cochran Jaime, Durumeric Zakir, Halderman J. Alex, Invernizzi Luca, Kallitsis Michalis, Kumar Deepak, Lever Chaz, Ma Zane, Mason Joshua, Menscher Damian, Seaman Chad, Sullivan Nick, Thomas Kurt, and Zhou Yi. 2017. Understanding the mirai botnet. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC’17). 10931110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, and Indrajit Ray. 2018. Behavioral fingerprinting of IoT devices. In Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security (ASHES’18). Association for Computing Machinery, New York, NY, 41–50.Google ScholarGoogle Scholar
  5. [5] Bou-Harb Elias, Debbabi Mourad, and Assi Chadi. 2016. A novel cyber security capability: Inferring internet-scale infections by correlating malware and probing activities. Comput. Netw. 94 (2016), 327343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Censys. 2015. A Search Engine Based on Internet-wide Scanning for the Devices and Networks. Retrieved from https://censys.io/Google ScholarGoogle Scholar
  7. [7] CVE. 2023. CVE, Common Vulnerabilities and Exposures. Retrieved from http://cve.mitre.org/Google ScholarGoogle Scholar
  8. [8] CVSS. 2023. A Free and Open Industry Standard for Assessing the Severity of Computer System Security Vulnerabilities.Retrieved from https://nvd.nist.gov/vuln-metrics/cvssGoogle ScholarGoogle Scholar
  9. [9] CWE. 2023. A Community-developed List of Common Software Security Weaknesses.Retrieved from https://cwe.mitre.org/Google ScholarGoogle Scholar
  10. [10] DevTag. 2021. Number of Connected IoT Devices Will Surge to 125 Billion by 2030. Retrieved from https://www.iot-now.com/tag/ihs-markit/Google ScholarGoogle Scholar
  11. [11] Dong Ying, Guo Wenbo, Chen Yueqi, Xing Xinyu, Zhang Yuqing, and Wang Gang. 2019. Towards the detection of inconsistencies in public security vulnerability reports. In Proceedings of the 28th USENIX Security Symposium (USENIX Security’19). 869885.Google ScholarGoogle Scholar
  12. [12] Durumeric Zakir, Wustrow Eric, and Halderman J. Alex. 2013. ZMap: Fast internet-wide scanning and its security applications. In Proceedings of the USENIX Security Symposium, Vol. 8.605620.Google ScholarGoogle Scholar
  13. [13] Fachkha Claude, Bou-Harb Elias, Keliris Anastasis, Memon Nasir D., and Ahamad Mustaque. 2017. Internet-scale probing of CPS: Inference, characterization and orchestration analysis. In Proceedings of the Network and Distributed System Security (NDSS) Symposium (NDSS’17).Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Feng Xuan, Li Qiang, Wang Haining, and Sun Limin. 2016. Characterizing industrial control system devices on the internet. In Proceedings of the IEEE 24th International Conference on Network Protocols (ICNP’16). IEEE, 110.Google ScholarGoogle Scholar
  15. [15] Feng Xuan, Li Qiang, Wang Haining, and Sun Limin. 2018. Acquisitional rule-based engine for discovering internet-of-things devices. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). Baltimore, MD, 327341.Google ScholarGoogle Scholar
  16. [16] Feng Xuan, Liao Xiaojing, Wang XiaoFeng, Wang Haining, Li Qiang, Yang Kai, Zhu Hongsong, and Sun Limin. 2019. Understanding and securing device vulnerabilities through automated bug report analysis. In Proceedings of the 28th USENIX Security Symposium (USENIX Security’19). USENIX Association, Berkeley, CA, 887903.Google ScholarGoogle Scholar
  17. [17] Reporting Guidelines for Security Vulnerability and Response.2016. Retrieved from https://www.symantec.com/security/OIS_Guidelines%20for%20responsible%20disclosure.pdfGoogle ScholarGoogle Scholar
  18. [18] Formby David, Srinivasan Preethi, Leonard Andrew M., Rogers Jonathan D., and Beyah Raheem A.. 2016. Who’s in control of your control system? Device fingerprinting for cyber-physical systems. In Proceedings of the Network and Distributed System Security (NDSS) Symposium (NDSS’16).Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] GoogleScraper. 2023. GoogleScraper. Retrieved from https://github.com/NikolaiT/GoogleScraperGoogle ScholarGoogle Scholar
  20. [20] Granjal Jorge, Monteiro Edmundo, and Silva Jorge Sá. 2015. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17, 3 (2015), 12941312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Hamza Ayyoob, Ranathunga Dinesha, Gharakheili Hassan Habibi, Benson Theophilus A., Roughan Matthew, and Sivaraman Vijay. 2020. Verifying and monitoring iots network behavior using mud profiles. IEEE Trans. Depend. Sec. Comput. (2020).Google ScholarGoogle Scholar
  22. [22] Hashmat Fabiha, Abbas Syed Ghazanfar, Hina Sadaf, Shah Ghalib A, Bakhshi Taimur, and Abbas Waseem. 2022. An automated context-aware IoT vulnerability assessment rule-set generator. Comput. Commun. 186 (2022), 133152.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Kotak Jaidip and Elovici Yuval. 2019. Iot device identification using deep learning. In Computational Intelligence in Security for Information Systems Conference. Springer, 7686.Google ScholarGoogle Scholar
  24. [24] Li Frank and Paxson Vern. 2017. A large-scale empirical study of security patches. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’17). ACM, New York, NY, 22012215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Liu Yongxin, Wang Jian, Li Jianqiang, Niu Shuteng, and Song Houbing. 2021. Machine learning for the detection and identification of internet of things devices: A survey. IEEE IoT J. 9, 1 (2021), 298320.Google ScholarGoogle Scholar
  26. [26] Marchal Samuel, Miettinen Markus, Nguyen Thien Duc, Sadeghi Ahmad-Reza, and Asokan N.. 2019. Audi: Toward autonomous iot device-type identification using periodic communication. IEEE J. Select. Areas Commun. 37, 6 (2019), 14021412.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Miettinen Markus, Marchal Samuel, Hafeez Ibbad, Asokan N., Sadeghi Ahmad-Reza, and Tarkoma Sasu. 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). IEEE, 21772184.Google ScholarGoogle Scholar
  28. [28] Mikolov Tomas, Chen Kai, Corrado Greg, and Dean Jeffrey. 2013. Efficient estimation of word representations in vector space. arXiv:1301.3781. Retrieved from https://arxiv.org/abs/1301.3781Google ScholarGoogle Scholar
  29. [29] Mosenia Arsalan and Jha Niraj K.. 2016. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5, 4 (2016), 586602.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Msadek Nizar, Soua Ridha, and Engel Thomas. 2019. Iot device fingerprinting: Machine learning based encrypted traffic analysis. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’19). IEEE, 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Mu Dongliang, Cuevas Alejandro, Yang Limin, Hu Hang, Xing Xinyu, Mao Bing, and Wang Gang. 2018. Understanding the reproducibility of crowd-reported security vulnerabilities. In Proceedings of the 27th \(\lbrace\)USENIX\(\rbrace\) Security Symposium (\(\lbrace\)USENIX\(\rbrace\) Security’18). 919936.Google ScholarGoogle Scholar
  32. [32] Nguyen Viet Hung and Massacci Fabio. 2013. The (un) reliability of nvd vulnerable versions data: An empirical experiment on google chrome vulnerabilities. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. 493498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] NLTK. 2001. A Suite of Libraries and Programs for Symbolic and Statistical Natural Language Processing. Retrieved from http://www.nltk.org/Google ScholarGoogle Scholar
  34. [34] Nmap. 1997. Network Security Scanner Tool.Google ScholarGoogle Scholar
  35. [35] Oser Pascal, Heijden Rens W. van der, Lüders Stefan, and Kargl Frank. 2022. Risk prediction of IoT devices based on vulnerability analysis. ACM Trans. Priv. Secur. 25, 2 (2022), 136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Peng Linning, Hu Aiqun, Zhang Junqing, Jiang Yu, Yu Jiabao, and Yan Yan. 2018. Design of a hybrid RF fingerprint extraction and device classification scheme. IEEE IoT J. 6, 1 (2018), 349360.Google ScholarGoogle Scholar
  37. [37] Polak Adam C. and Goeckel Dennis L.. 2015. Wireless device identification based on RF oscillator imperfections. IEEE Trans. Inf. Forens. Secur. 10, 12 (2015), 24922501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Pytorch. 2018. An Open Source Machine Learning Framework That Accelerates the Path from Research Prototyping to Production Deployment. Retrieved from https://pytorch.org/Google ScholarGoogle Scholar
  39. [39] Report Mirai. 2016. The Cyber Attack Disrupts Internet Service across Europe and US via Mirai.Google ScholarGoogle Scholar
  40. [40] Riyaz Shamnaz, Sankhe Kunal, Ioannidis Stratis, and Chowdhury Kaushik. 2018. Deep learning convolutional neural networks for radio identification. IEEE Commun. Mag. 56, 9 (2018), 146152.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Sabottke Carl, Suciu Octavian, and Dumitraş Tudor. 2015. Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits. In Proceedings of the 24th USENIX Security Symposium. USENIX Association, Berkeley, CA, 10411056.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Shamsi Zain, Cline Daren B. H., and Loguinov Dmitri. 2017. Faulds: A non-parametric iterative classifier for internet-wide OS fingerprinting. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 971982.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Shamsi Zain, Nandwani Ankur, Leonard Derek, and Loguinov Dmitri. 2014. Hershel: Single-packet Os fingerprinting. In Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS’14). 195206.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Shodan. 2009. The Search Engine for Internet-connected Devices. Retrieved from https://www.shodan.io/Google ScholarGoogle Scholar
  45. [45] Shokeen Rahul, Shanmugam Bharanidharan, Kannoorpatti Krishnan, Azam Sami, Jonkman Mirjam, and Alazab Mamoun. 2019. Vulnerabilities analysis and security assessment framework for the internet of things. In Proceedings of the Cybersecurity and Cyberforensics Conference (CCC’19). IEEE, 2229.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Sicari Sabrina, Rizzardi Alessandra, Grieco Luigi Alfredo, and Coen-Porisini Alberto. 2015. Security, privacy and trust in internet of things: The road ahead. Comput. Netw. 76 (2015), 146164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Sivanathan Arunan. 2020. IoT behavioral monitoring via network traffic analysis. arXiv:2001.10632. Retrieved from https://arxiv.org/abs/2001.10632Google ScholarGoogle Scholar
  48. [48] Sivanathan Arunan, Gharakheili Hassan Habibi, Loi Franco, Radford Adam, Wijenayake Chamith, Vishwanath Arun, and Sivaraman Vijay. 2018. Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18, 8 (2018), 17451759.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Sivanathan Arunan, Gharakheili Hassan Habibi, and Sivaraman Vijay. 2020. Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans. Netw. Serv. Manage. 17, 1 (2020), 6074.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Song Jinke, Li Qiang, Wang Haining, and Sun Limin. 2020. Under the concealing surface: Detecting and understanding live webcams in the wild. In Proceedings of the ACM on Measurement and Analysis of Computing Systems, SIGMETRICS ’20. 4, 1 (2020), 125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. [51] Beautiful Soup. 2012. Package for Parsing HTML and XML Documents. Retrieved from https://www.crummy.com/software/BeautifulSoup/Google ScholarGoogle Scholar
  52. [52] Thangavelu Vijayanand, Divakaran Dinil Mon, Sairam Rishi, Bhunia Suman Sankar, and Gurusamy Mohan. 2018. DEFT: A distributed IoT fingerprinting technique. IEEE IoT J. 6, 1 (2018), 940952.Google ScholarGoogle Scholar
  53. [53] Venkataraman Shobha, Caballero Juan, Poosankam Pongsin, Kang Min Gyung, and Song Dawn Xiaodong. 2007. Fig: Automatic fingerprint generation. In Proceedings of the Network and Distributed System Security Symposium (NDSS’07).Google ScholarGoogle Scholar
  54. [54] Weber Rolf H. and Studer Evelyne. 2016. Cybersecurity in the internet of things: Legal aspects. Comput. Law Secur. Rev. 32, 5 (2016), 715728.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Williams Ryan, McMahon Emma, Samtani Sagar, Patton Mark, and Chen Hsinchun. 2017. Identifying vulnerabilities of consumer internet of things (IoT) devices: A scalable approach. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI’17). IEEE, 179181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Yake. 2023. Yake. Retrieved from https://github.com/LIAAD/yakeGoogle ScholarGoogle Scholar
  57. [57] Yang Kai, Li Qiang, and Sun Limin. 2019. Towards automatic fingerprinting of IoT devices in the cyberspace. Comput. Netw. 148 (2019), 318327. Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] Yu Jiabao, Hu Aiqun, Li Guyue, and Peng Linning. 2019. A robust RF fingerprinting approach using multisampling convolutional neural network. IEEE IoT J. 6, 4 (2019), 67866799.Google ScholarGoogle Scholar
  59. [59] Zheng Tianhang, Sun Zhi, and Ren Kui. 2019. FID: Function modeling-based data-independent and channel-robust physical-layer identification. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’19). IEEE, 199207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Zhou Xinyu, Hu Aiqun, Li Guyue, Peng Linning, Xing Yuexiu, and Yu Jiabao. 2019. Design of a robust RF fingerprint generation and classification scheme for practical device identification. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’19). IEEE, 196204.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Zhu Fangzhou, Liu Liang, Meng Weizhi, Lv Ting, Hu Simin, and Ye Renjun. 2020. Scaffisd: A scalable framework for fine-grained identification and security detection of wireless routers. In Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’20). IEEE, 11941199.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] ztag. 2023. ZTag, an Utility for Annotating Raw Scan Data with Additional Metadata. Retrieved from http://github.com/zmap/ztagGoogle ScholarGoogle Scholar

Index Terms

  1. Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 20, Issue 1
        January 2024
        717 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3618078
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 October 2023
        • Online AM: 17 July 2023
        • Revised: 20 June 2023
        • Accepted: 20 June 2023
        • Received: 19 May 2023
        Published in tosn Volume 20, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)285
        • Downloads (Last 6 weeks)40

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text