20
1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity, TPM, @TU DelG, Netherlands ) https://xkcd.com/1966/

The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

1

The Internet-of-Insecure-ThingsCauses, Trends and Responses

( @ RIPE 77 )

Arman Noroozian( Economics of Cybersecurity, TPM, @TU DelG, Netherlands )

https://xkcd.com/1966/

Page 2: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

2

Page 3: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

3https://www.ncta.com/sites/default/files/platform-images/wp-content/uploads/2014/05/growth-of-internet-of-things-hero-1024x585.jpg

NCTA — The Internet & Television Association

Page 4: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

4

Whole Lo(a Ques-ons Raised!!• How?• How did we get into this mess?• How do we get out of this mess?

Page 5: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

5

How did we get here?• Fragmented landscape• Vendors without competence or incen5ves• Lack of visibility into which ‘things’ fail• Dependencies in value chains

Page 6: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

6

How do we get out of it?(Mopping While the Tap is S8ll Running)

Page 7: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

7

► Awareness raising(but don’t blame the victim)

► Monitoring and transparency(name, shame, and praise)

► Certifications and standards (FTC fining ASUS, D-Link)

► Liability, duty to care(make vendors bear the cost)

► Intermediary Role(ask ISPs to cut off access)

► Strengthening user rights(opt in, data minimization)

Governance Strategies Being Discussed

Page 8: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

8

► Awareness raising(but don’t blame the victim)

► Monitoring and transparency(name, shame, and praise)

► Certifications and standards (FTC fining ASUS, D-Link)

► Liability, duty to care(make vendors bear the cost)

► Intermediary Role(ask ISPs to cut off access)

► Strengthening user rights(opt in, data minimization)

Governance Strategies

Page 9: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

9

Where are the hacked devices?

Page 10: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

10

Monitoring IoT compromise• Honeypot infrastructure with Yokohama Na6onal

University (Japan)

• Emulated and physical devices

• Port 22, 23, 80, 8080, 53413, …

• Log interac6ons, scan back, aLacking devices

Page 11: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

11

Who operates the network?

Page 12: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

12

Infec&on rates across ISPs

Page 13: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

13

Who operates the network (NL)?hosting3%

isp-broadband54%

isp-mobile1%

isp-other13%

NULL27%

other-intermediary2%

Page 14: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

14

Cleaning IoT Devices (KPN)• Walled Garden• Cutting off access to infected devices• 1736 quarantining actions • 1208 customers• 50% clean infections• Most quarantined once

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. Orçun Çetin, Lisette Altena, Carlos Gañán, Michel van Eeten. In SOUPS 2018

Page 15: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

15

Cleaning IoT Devices (Cont.)• Randomized Control

Experiment• 220 Customers

Page 16: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

16

Cleaning IoT Devices (Cont.)• Randomized Control Experiment• 92% Cleaned• In 14 days!

Page 17: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

17

► Awareness raising(but don’t blame the vic7m)

► Monitoring and transparency(name, shame, and praise)

► Cer7fica7ons and standards (FTC fining ASUS, D-Link)

► Liability, duty to care(make vendors bear the cost)

► Intermediary Role(ask ISPs to cut off access)

► Strengthening user rights(opt in, data minimization)

In ConclusionNetwork operators can significantly help

Page 18: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

18

Future Research

MINIONS - Mi#gatINg IOt-based DDoS a3acks via the DNS

Page 19: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

19

CPE

DVR

Environment Monitoring Unit

EOC

EOC Slave

Firewall

Gateway

HVR

IP Camera

mobile router

Modem

Motherboard

NAS

NVR

Router

Security Appliances

Set-Top-Box

USB Device Server

Web Accelerator and SSL appliance

Web Camera

Web Camera/DVR

Wi-Fi Disk

AR BG BR CA CL CN CO CR EG ES FR GB ID IL IN IR IT KR MD MX MY PH PK PL RO RU TH TR TT TW UA US VE VN ZA

100

1,000

5,000

20,000# Devices

Page 20: The Internet-of-Insecure-Things Causes, Trends and ... · 1 The Internet-of-Insecure-Things Causes, Trends and Responses ( @ RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity,

20

Thank you!

Follow our research onhttps://www.tudelft.nl/cybersecurity