2020
DOI: 10.1109/access.2020.3022272
|View full text |Cite
|
Sign up to set email alerts
|

eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers

Abstract: Distributed Denial of Service (DDoS) attacks have caused significant disruptions in the operations of Internet-based services. These DDoS attacks use large scale botnets, which often exploit millions of compromised Internet of Things (IoT) devices worldwide. IoT devices are traditionally less secure and are easy to be exploited. The extent of these exploitations has increased after the publication of the Mirai botnet source code on GitHub that provided a foundation for the attackers to develop and launch Mirai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…MUD is unable to identify the vulnerabilities and bugs in the device firmware before it requests the MUD profile. However, there are some advancements on the MUD [163], that only allowing the device to request a MUD profile when the vulnerability factor of the device is below a certain threshold. Also, it presents an authentication mechanism for MUD profiles for secure and reliable communication of device profiles.…”
Section: A Unable To Detect Firmware Vulnerabilitymentioning
confidence: 99%
“…MUD is unable to identify the vulnerabilities and bugs in the device firmware before it requests the MUD profile. However, there are some advancements on the MUD [163], that only allowing the device to request a MUD profile when the vulnerability factor of the device is below a certain threshold. Also, it presents an authentication mechanism for MUD profiles for secure and reliable communication of device profiles.…”
Section: A Unable To Detect Firmware Vulnerabilitymentioning
confidence: 99%
“…Furthermore, [32] uses the same tool to create a botnet detection and mitigation system. The authors of [33] also employ MUD Maker to generate MUD files associated to devices that are submitted to a vulnerability assessment process before getting network access. Furthermore, [21] uses this tool as an example to show how MUD restrictions in a network could be modified to mitigate privacy concerns.…”
Section: A Mud Profiles Generationmentioning
confidence: 99%
“…Content may change prior to final publication. [33] (MUD Maker) [34] (MUDgee) [36] (MUDgee) [37] (MUDgee) [38] (MUDgee) [39] (MUDgee) [21] (MUD Maker) [40] (MUDgee) [41] (MUDgee) [20] (security testing results [55]) [44] (devices' changing behavior in smart buildings) [32] (MUD Maker) [19] (Medium-level Security Policy Language (MSPL) [45]) [47] (QoS parameters) [42] (MUDgee) [48] (human usage aspects) [49] (physical layer parameters and flow statistics) [52] (devices' fingerprinting data) [30] (MUD Maker) [42] (MUDgee) behavioral profiles for connected devices. These aspects are further discussed in Section V.…”
Section: A Mud Profiles Generationmentioning
confidence: 99%
See 2 more Smart Citations