Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

Koji Nakao, Katsunari Yoshioka, Takayuki Sasaki, Rui Tanabe, Xuping Huang, Takeshi Takahashi, Akira Fujita, Jun'ichi Takeuchi, Noboru Murata, Junji Shikata, Kazuki Iwamoto, Kazuki Takada, Yuki Ishida, Masaru Takeuchi*, Naoto Yanai*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.

Original languageEnglish
Pages (from-to)1304-1315
Number of pages12
JournalIEICE Transactions on Information and Systems
VolumeE106.D
Issue number9
DOIs
Publication statusPublished - 2023 Sept

Keywords

  • IoT honeypot
  • IoT malware
  • IoT malware disabling
  • IoT system disabling
  • cyber threat intelligence
  • cybersecurity
  • persistent infection

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware'. Together they form a unique fingerprint.

Cite this