in 2016, the creators of the Mirai botnet clearly demonstrated the risks posed by devices connected to the internet by exploiting the vulnerabilities of thousands of IoT devices. It is becoming increasingly clear that effective protection against IoT risks cannot be achieved without accurate identification of every device on the internet or corporate network.
According to forecasts from Statista, by 2033, the number of smart devices used in corporate networks and on the internet will exceed 39 billion. Continuous monitoring and control of network activity are essential to provide effective protection against risks associated with the internet of things.
However, this requires identifying all devices on the network. This can be achieved by capturing the digital fingerprint of the device’s operating system, as discussed in this article.
As we all know, the IoT concept has brought together various technical devices used in everyday life: smart TVs, routers, IP cameras, smart speakers and other gadgets and household appliances with internet access.
The issue with IoT is that all these devices are connected to the internet and can automatically perform certain tasks. This connectivity has allowed cybercriminals to repeatedly exploit vulnerabilities in the internet of things and the inherent unreliability of many gadgets connected to the network. The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management.
In the case mentioned above, the Mirai botnet scanned the internet in search of IoT devices based on ARC processors and then took control of them, adding them to its zombie network. After finding a suitable device, it began using the simplest brute-force attack until it gained access.
In most cases, finding a login-password combination was not difficult. Many IoT devices come with simple default credentials that are pre-installed at the factory. Manufacturers have been releasing equipment with the same default settings for years because it makes testing and servicing easier for them.
Experts recommend changing the default settings immediately before starting to use an IoT device. However, most users tend to overlook these details, opting instead to rely on the official application provided by the supplier. As a result, it is not surprising that the Mirai botnet managed to compromise around 145,000 IoT devices. This allowed the creators of Mirai to organize massive DDoS attacks on the network resources of several hosting providers and popular internet sites.
This case is far from the only one, although it is considered one of the largest attacks involving smart devices. One of the well-known successors of Mirai is the NoaBot botnet, which not only used gadgets for DDoS attacks but also for more complex tasks, such as crypto mining.
Most cyberattacks on smart home devices are based on modifications of the Mirai malware. At the same time, more and more industries are incorporating IoT devices, including healthcare, the financial sector and the hospitality industry. With the widespread use of smart devices in manufacturing, medical institutions and other enterprises, there is an increasing need to create a secure industrial internet of things (IIoT).
The increase in the number of smart devices has raised a critical question for information security specialists: How to manage IoT traffic and ensure the protection of other network nodes? After all, using this attack vector, cybercriminals can compromise the confidentiality of sensitive information or seize control of vital resources, such as power supply systems.
IT administrators can identify the type of device and its operating system by using unique identifiers transmitted by pre-installed client software. However, installing such applications may not be possible on some operating systems. This is particularly true for the operating systems used in internet of things devices and integrated systems.
IoT devices are designed to perform specific tasks and typically operate with minimal computational power, memory and internal storage. As a result, IoT devices may not be able to support the installation of additional applications.
For these reasons, we are interested in a passive identification method that does not require the installation of any software. It should be as effective as a monitoring system specifically optimized for IoT devices. Such methods include analyzing the digital footprint.
Passive OS fingerprinting works by examining specific characteristics of network traffic that indirectly reveal the operating system of the client device. It also takes into account the communication channel used for the Internet connection.
This approach relies on established methods and standard fingerprint databases, which summarize traffic patterns and behaviors typical of different operating systems, such as parameters broadcast in TCP/IP headers and DHCP requests.
In essence, passive fingerprinting – taking digital fingerprints – compares the network traffic generated by a device and its parameters with known OS profiles, allowing the classification of specific network activity. It is akin to the unobtrusive work of a security service that seeks to identify potential intruders among the general population based on their appearance and behavior without directly interacting with them. Similarly, a device’s interaction with the network can reveal much about its ownership, functionality and potential hidden threats. Passive reading does not require installing a client application.
The following characteristics can be used to obtain OS digital fingerprints:
Despite some limitations, a comprehensive assessment of behavior and parameters at the TCP/IP protocol level often allows for reliable identification of devices. Information security administrators can use OS fingerprinting to guide access control decisions and ensure compliance with network security policies.
Given the rapid growth of the internet of things and its associated vulnerabilities, OS fingerprints are crucial for the passive identification of devices in corporate networks. For example, cameras, routers, and printers are well-known as popular targets for hackers. However, manually removing digital fingerprints is a complex task that requires practical knowledge in this area and is time-consuming.
The problem lies in the scale. Manually analyzing traffic flow in corporate networks is nearly impossible because it requires comparing thousands of unique identifiers. To address this issue, enterprises can leverage the capabilities of converged network infrastructure and cloud security stacks. Solutions like secure access service edge (SASE) can provide access to necessary resources. Additionally, machine learning algorithms can be employed to analyze large volumes of network traffic, helping to identify signs of suspicious behavior by creating patterns based on data processing statistics.
A converged network infrastructure can enable automated collection and analysis of network data. The gathered information can then be compared with security data from various sources, such as cyberattack detection systems, firewall logs, and router configurations. This approach provides a comprehensive view of network activity and helps identify connections with specific operating systems and IoT devices.
Monitoring network security, detecting suspicious activity and preventing potential threats are all inseparable from the mandatory identification of IoT devices. Without a firm understanding of these principles, IT specialists and information security teams will be unable to implement effective data protection measures.
Convergence significantly simplifies the automatic identification and classification of client devices based on their unique characteristics. Additionally, organizing a centralized management console streamlines the process of identifying and analyzing OS digital fingerprints within the enterprise. These measures help ensure a prompt response to issues related to granting smart devices access to the internal network and maintaining compliance with security policies.
Recent Articles By Author