IoT Security Flashcards

1
Q

Typical IoT Ecosystem

A
  • Command Relay Server
  • Update CDN
  • Web GUI
  • Cloud Storage
  • External API
  • Internal API
  • Authentication Server
  • Heartbeat Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IoT Common Vulnerabilities

A
  • Same pre-shared key
  • No authentication of updates
  • Open services (telnet)
  • Old software version
  • Default passwords
  • Identification using MAC
  • Attacks on voice UI
  • Unencrypted traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks on Voice Assistants

A
  • Cocaine Noodles
    -> Analyze voice recognition software
    -> Create mangled voice commands
    -> Unrecognizable by humans but understandable by assistants
  • Dolphin attack
    -> Record voice command
    -> Shift audio into ultrasonic spectrum
    -> Control different voice assistants inaudibly
  • Lying Alexa
    -> Utilize skills to return information
    -> Inaudible command injection redirects to different skill
    -> Alexa returns misinformation while user is talking to it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mirai

A
  • IoT botnet appearing for the first time in 2016
  • Infects typical IoT devices
  • Actively scans the network and propagates to any vulnerable devices it finds
  • Has been used to perform one of the largest DDoS attacks in history
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is Mirai possible?

A
  • Vulnerabilities: Manufacturers expose sensitive services access to their devices
  • Weak credentials: Poor default passwords, password change not enforced
  • Poor network management: Users do not have proper network configuration leading to exposure of IoT devices on Internet
  • Always online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mirai: Defense Mechanisms: Mitigation

A
  • Limit exposure to external adversaries (use of firewalls and NAT, closing open ports not needed for functionality)
  • Ensure correct security configuration (set the admin password)
  • Remove device vulnerabilities (security patches)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mirai: Defense Mechanisms: Detection

A
  • Signature-based intrusion detection
    -> System monitors communications or device behaviour for known patterns of attack
    -> Fast and reliable, widely deployed
  • Anomaly-based intrusion detection
    -> Detects deviations from normal behaviour as anomalies
    -> Able to detect also previously unknown attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mirai: Defense Mechanisms: Recovery

A
  • Network isolation
    -> Traffic filtering rules used to isolate infected device from others
    -> Prevent further injections in the network
    -> Prevent device from attacking remote victims
  • Reset device
    -> Most IoT malware don’t maintain persistent state
    -> Simple reboot will remove possible infections (requires manual intervention in many cases)
    -> Vulnerability is however only removed through SW patch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mirai process

A

1) Scan
2) Report IP + credentials to Listener Server
3) Listener Server adds new device with Loader Server
4) Load (Infect)
5) Recruited (Infect)
6) Send command to C&C server
7) Dispatch (Versende) command
8) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly