TY - JOUR
T1 - Mitigate
T2 - Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware
AU - Nakao, Koji
AU - Yoshioka, Katsunari
AU - Sasaki, Takayuki
AU - Tanabe, Rui
AU - Huang, Xuping
AU - Takahashi, Takeshi
AU - Fujita, Akira
AU - Takeuchi, Jun'ichi
AU - Murata, Noboru
AU - Shikata, Junji
AU - Iwamoto, Kazuki
AU - Takada, Kazuki
AU - Ishida, Yuki
AU - Takeuchi, Masaru
AU - Yanai, Naoto
N1 - Publisher Copyright:
© 2023 The Institute of Electronics, Information and Communication Engineers.
PY - 2023/9
Y1 - 2023/9
N2 - In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.
AB - In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.
KW - IoT honeypot
KW - IoT malware
KW - IoT malware disabling
KW - IoT system disabling
KW - cyber threat intelligence
KW - cybersecurity
KW - persistent infection
UR - http://www.scopus.com/inward/record.url?scp=85174349168&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85174349168&partnerID=8YFLogxK
U2 - 10.1587/transinf.2022ICI0001
DO - 10.1587/transinf.2022ICI0001
M3 - Article
AN - SCOPUS:85174349168
SN - 0916-8532
VL - E106.D
SP - 1304
EP - 1315
JO - IEICE Transactions on Information and Systems
JF - IEICE Transactions on Information and Systems
IS - 9
ER -