Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Internet-of-Insecure-Things Causes, Trends and Responses

Similar presentations


Presentation on theme: "The Internet-of-Insecure-Things Causes, Trends and Responses"— Presentation transcript:

1 The Internet-of-Insecure-Things Causes, Trends and Responses
RIPE 77 ) Arman Noroozian ( Economics of Cybersecurity, Delft, Netherlands )

2

3 NCTA — The Internet & Television Association

4 Whole Lotta Questions Raised!!
How? How did we get into this mess? How do we get out of this mess?

5 How did we get here? Fragmented landscape
Vendors without competence or incentives Lack of visibility into which ‘things’ fail Dependencies in value chains

6 How do we get out of it? (Mopping While the Tap is Still Running)

7 Governance Strategies Being Discussed
Awareness raising (but don’t blame the victim) Monitoring and transparency (name, shame, and praise) Certifications and standards (FTC fining ASUS, D-Link) Liability, duty to care (make vendors bear the cost) Intermediary Role (ask ISPs to cut off access) Strengthening user rights (opt in, data minimization)

8 Governance Strategies
Awareness raising (but don’t blame the victim) Monitoring and transparency (name, shame, and praise) Certifications and standards (FTC fining ASUS, D-Link) Liability, duty to care (make vendors bear the cost) Intermediary Role (ask ISPs to cut off access) Strengthening user rights (opt in, data minimization)

9 Where are the hacked devices?

10 Monitoring IoT compromise
Honeypot infrastructure with Yokohama National University (Japan) Emulated and physical devices Port 22, 23, 80, 8080, 53413, … Log interactions, scan back, attacking devices

11 Who operates the network?

12 Infection rates across ISPs

13 Who operates the network (NL)?

14 Cleaning IoT Devices (KPN)
Walled Garden Cutting off access to infected devices 1736 quarantining actions 1208 customers 50% clean infections Most quarantined once Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. Orçun Çetin, Lisette Altena, Carlos Gañán, Michel van Eeten. In SOUPS 2018

15 Cleaning IoT Devices (Cont.)
Randomized Control Experiment 220 Customers

16 Cleaning IoT Devices (Cont.)
Randomized Control Experiment 92% Cleaned In 14 days!

17 In Conclusion Network operators can significantly help
Awareness raising (but don’t blame the victim) Monitoring and transparency (name, shame, and praise) Certifications and standards (FTC fining ASUS, D-Link) Liability, duty to care (make vendors bear the cost) Intermediary Role (ask ISPs to cut off access) Strengthening user rights (opt in, data minimization)

18 Future Research MINIONS - MitigatINg IOt-based DDoS attacks via the DNS

19

20 Thank you! Follow our research on


Download ppt "The Internet-of-Insecure-Things Causes, Trends and Responses"

Similar presentations


Ads by Google