Analyzing IoT-Based Botnet Malware Activity with Distributed Low Interaction Honeypots

Sergio Vidal-González,Isaías García-Rodríguez,Héctor Aláiz-Moretón,Carmen Benavides-Cuéllar,José Alberto Benítez-Andrades,María Teresa García-Ordás,Paulo Novais
DOI: https://doi.org/10.1007/978-3-030-45691-7_30
2020-01-01
Abstract:The increasing number of Internet of Things devices, and their limited built-in security, has led to a scenario where many of the most powerful and dangerous botnets nowadays are comprised of these type of compromised devices, being the source of the most important distributed denial of service attacks in history. This work proposes a solution for monitoring and studying IoT-based botnet malware activity by using a distributed system of low interaction honeypots implementing Telnet and SSH remote access services, that are used to manage the majority of IoT devices in the home environment like routers, cameras, printers and other appliances. The solution captures and displays real-time data coming from different honeypots at different locations worldwide, allowing the logging and study of the different connections and attack methodologies, and obtaining samples of the distributed malware. All the information gathered is stored for later analysis and categorization, resulting in a low-cost and relatively simple threat information and forecasting system regarding IoT botnets.
What problem does this paper attempt to address?