Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network
Many studies have discovered internet-facing systems exposing services that are vulnerable to attack. These are often assumed to be misconfigured systems that are not meant to expose these services to the network, especially not in an enterprise network. In this study, we clarify the causes of the p...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2309 |
---|---|
container_issue | |
container_start_page | 2291 |
container_title | |
container_volume | |
creator | Sasaki, Takayuki Noma, Takaya Morii, Yudai Shimura, Toshiya Eeten, Michel van Yoshioka, Katsunari Matsumoto, Tsutomu |
description | Many studies have discovered internet-facing systems exposing services that are vulnerable to attack. These are often assumed to be misconfigured systems that are not meant to expose these services to the network, especially not in an enterprise network. In this study, we clarify the causes of the presence of IoT devices exposing Telnet and FTP in a university enterprise network. This also helps us to understand who is responsible. We scanned the network and found 185 IoT devices consisting of 30 device models exposing Telnet and 49 models exposing FTP. We sent out a security notification and a survey to device owners. The survey demonstrated that 2 out of 21 and 8 out of 41 owners intentionally enabled Telnet and FTP, respectively, on all their devices. After receiving the notification, 38 out of 47 owners said they were willing to take measures on at least one of their IoT devices. All except one of the devices of these willing owners were successfully remediated. When we investigated the manuals of the devices, we were able to confirm that there was no disclosure whatsoever of the exposed service in 15 out of 30 manuals for models with Telnet and 10 out of 49 manuals for models with FTP. We also confirmed, by combining a survey of the manufacturers with the device manuals, that 22 out of 30 and 29 out of 49 devices enabled Telnet and FTP by default, respectively. From the above results, we conclude that the presence of misconfigured devices was less driven by human errors of the owners and more by the choices of the manufacturers. The majority of owners were motivated to remediate the security risks once made aware of them. |
doi_str_mv | 10.1109/SP54263.2024.00117 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_10646731</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10646731</ieee_id><sourcerecordid>10646731</sourcerecordid><originalsourceid>FETCH-LOGICAL-i106t-f4ebd6f6a297c05e32471a9383f4a03454f7ec19e63198de66dc2f719b6bead93</originalsourceid><addsrcrecordid>eNotkMFKAzEURaMgWGt_QFzkB6a-5GWSyUpKW7VQrGDFnSUz89JG7aRMxqp_b1FXF86Bs7iMXQgYCgH26vEhV1LjUIJUQwAhzBEbWGMLzAFRIIhj1pNo8kxIMKfsLKVXAAloVY-9PG8in5PveLchPomx5YsdNdd81uwpdWHtutCsf-XYfSRKPHo-_drFRDWfxSWf0D5UBxwa7ho-qlxN21Dxe-o-Y_t2zk68e080-N8-e7qZLsd32XxxOxuP5lkQoLvMKypr7bWT1lSQE0plhLNYoFcOUOXKG6qEJY3CFjVpXVfSG2FLXZKrLfbZ5V83ENFq14ata79Xh7bS5nDBD81SU0o</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network</title><source>IEEE Electronic Library (IEL)</source><creator>Sasaki, Takayuki ; Noma, Takaya ; Morii, Yudai ; Shimura, Toshiya ; Eeten, Michel van ; Yoshioka, Katsunari ; Matsumoto, Tsutomu</creator><creatorcontrib>Sasaki, Takayuki ; Noma, Takaya ; Morii, Yudai ; Shimura, Toshiya ; Eeten, Michel van ; Yoshioka, Katsunari ; Matsumoto, Tsutomu</creatorcontrib><description>Many studies have discovered internet-facing systems exposing services that are vulnerable to attack. These are often assumed to be misconfigured systems that are not meant to expose these services to the network, especially not in an enterprise network. In this study, we clarify the causes of the presence of IoT devices exposing Telnet and FTP in a university enterprise network. This also helps us to understand who is responsible. We scanned the network and found 185 IoT devices consisting of 30 device models exposing Telnet and 49 models exposing FTP. We sent out a security notification and a survey to device owners. The survey demonstrated that 2 out of 21 and 8 out of 41 owners intentionally enabled Telnet and FTP, respectively, on all their devices. After receiving the notification, 38 out of 47 owners said they were willing to take measures on at least one of their IoT devices. All except one of the devices of these willing owners were successfully remediated. When we investigated the manuals of the devices, we were able to confirm that there was no disclosure whatsoever of the exposed service in 15 out of 30 manuals for models with Telnet and 10 out of 49 manuals for models with FTP. We also confirmed, by combining a survey of the manufacturers with the device manuals, that 22 out of 30 and 29 out of 49 devices enabled Telnet and FTP by default, respectively. From the above results, we conclude that the presence of misconfigured devices was less driven by human errors of the owners and more by the choices of the manufacturers. The majority of owners were motivated to remediate the security risks once made aware of them.</description><identifier>EISSN: 2375-1207</identifier><identifier>EISBN: 9798350331301</identifier><identifier>DOI: 10.1109/SP54263.2024.00117</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>analysis of device manuals ; Internet of Things ; IoT ; Manuals ; notifications ; Privacy ; Security ; Surveys ; surveys of owners and manufacturers</subject><ispartof>2024 IEEE Symposium on Security and Privacy (SP), 2024, p.2291-2309</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10646731$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10646731$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sasaki, Takayuki</creatorcontrib><creatorcontrib>Noma, Takaya</creatorcontrib><creatorcontrib>Morii, Yudai</creatorcontrib><creatorcontrib>Shimura, Toshiya</creatorcontrib><creatorcontrib>Eeten, Michel van</creatorcontrib><creatorcontrib>Yoshioka, Katsunari</creatorcontrib><creatorcontrib>Matsumoto, Tsutomu</creatorcontrib><title>Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network</title><title>2024 IEEE Symposium on Security and Privacy (SP)</title><addtitle>SP</addtitle><description>Many studies have discovered internet-facing systems exposing services that are vulnerable to attack. These are often assumed to be misconfigured systems that are not meant to expose these services to the network, especially not in an enterprise network. In this study, we clarify the causes of the presence of IoT devices exposing Telnet and FTP in a university enterprise network. This also helps us to understand who is responsible. We scanned the network and found 185 IoT devices consisting of 30 device models exposing Telnet and 49 models exposing FTP. We sent out a security notification and a survey to device owners. The survey demonstrated that 2 out of 21 and 8 out of 41 owners intentionally enabled Telnet and FTP, respectively, on all their devices. After receiving the notification, 38 out of 47 owners said they were willing to take measures on at least one of their IoT devices. All except one of the devices of these willing owners were successfully remediated. When we investigated the manuals of the devices, we were able to confirm that there was no disclosure whatsoever of the exposed service in 15 out of 30 manuals for models with Telnet and 10 out of 49 manuals for models with FTP. We also confirmed, by combining a survey of the manufacturers with the device manuals, that 22 out of 30 and 29 out of 49 devices enabled Telnet and FTP by default, respectively. From the above results, we conclude that the presence of misconfigured devices was less driven by human errors of the owners and more by the choices of the manufacturers. The majority of owners were motivated to remediate the security risks once made aware of them.</description><subject>analysis of device manuals</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Manuals</subject><subject>notifications</subject><subject>Privacy</subject><subject>Security</subject><subject>Surveys</subject><subject>surveys of owners and manufacturers</subject><issn>2375-1207</issn><isbn>9798350331301</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMFKAzEURaMgWGt_QFzkB6a-5GWSyUpKW7VQrGDFnSUz89JG7aRMxqp_b1FXF86Bs7iMXQgYCgH26vEhV1LjUIJUQwAhzBEbWGMLzAFRIIhj1pNo8kxIMKfsLKVXAAloVY-9PG8in5PveLchPomx5YsdNdd81uwpdWHtutCsf-XYfSRKPHo-_drFRDWfxSWf0D5UBxwa7ho-qlxN21Dxe-o-Y_t2zk68e080-N8-e7qZLsd32XxxOxuP5lkQoLvMKypr7bWT1lSQE0plhLNYoFcOUOXKG6qEJY3CFjVpXVfSG2FLXZKrLfbZ5V83ENFq14ata79Xh7bS5nDBD81SU0o</recordid><startdate>20240519</startdate><enddate>20240519</enddate><creator>Sasaki, Takayuki</creator><creator>Noma, Takaya</creator><creator>Morii, Yudai</creator><creator>Shimura, Toshiya</creator><creator>Eeten, Michel van</creator><creator>Yoshioka, Katsunari</creator><creator>Matsumoto, Tsutomu</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20240519</creationdate><title>Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network</title><author>Sasaki, Takayuki ; Noma, Takaya ; Morii, Yudai ; Shimura, Toshiya ; Eeten, Michel van ; Yoshioka, Katsunari ; Matsumoto, Tsutomu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i106t-f4ebd6f6a297c05e32471a9383f4a03454f7ec19e63198de66dc2f719b6bead93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>analysis of device manuals</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Manuals</topic><topic>notifications</topic><topic>Privacy</topic><topic>Security</topic><topic>Surveys</topic><topic>surveys of owners and manufacturers</topic><toplevel>online_resources</toplevel><creatorcontrib>Sasaki, Takayuki</creatorcontrib><creatorcontrib>Noma, Takaya</creatorcontrib><creatorcontrib>Morii, Yudai</creatorcontrib><creatorcontrib>Shimura, Toshiya</creatorcontrib><creatorcontrib>Eeten, Michel van</creatorcontrib><creatorcontrib>Yoshioka, Katsunari</creatorcontrib><creatorcontrib>Matsumoto, Tsutomu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sasaki, Takayuki</au><au>Noma, Takaya</au><au>Morii, Yudai</au><au>Shimura, Toshiya</au><au>Eeten, Michel van</au><au>Yoshioka, Katsunari</au><au>Matsumoto, Tsutomu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network</atitle><btitle>2024 IEEE Symposium on Security and Privacy (SP)</btitle><stitle>SP</stitle><date>2024-05-19</date><risdate>2024</risdate><spage>2291</spage><epage>2309</epage><pages>2291-2309</pages><eissn>2375-1207</eissn><eisbn>9798350331301</eisbn><coden>IEEPAD</coden><abstract>Many studies have discovered internet-facing systems exposing services that are vulnerable to attack. These are often assumed to be misconfigured systems that are not meant to expose these services to the network, especially not in an enterprise network. In this study, we clarify the causes of the presence of IoT devices exposing Telnet and FTP in a university enterprise network. This also helps us to understand who is responsible. We scanned the network and found 185 IoT devices consisting of 30 device models exposing Telnet and 49 models exposing FTP. We sent out a security notification and a survey to device owners. The survey demonstrated that 2 out of 21 and 8 out of 41 owners intentionally enabled Telnet and FTP, respectively, on all their devices. After receiving the notification, 38 out of 47 owners said they were willing to take measures on at least one of their IoT devices. All except one of the devices of these willing owners were successfully remediated. When we investigated the manuals of the devices, we were able to confirm that there was no disclosure whatsoever of the exposed service in 15 out of 30 manuals for models with Telnet and 10 out of 49 manuals for models with FTP. We also confirmed, by combining a survey of the manufacturers with the device manuals, that 22 out of 30 and 29 out of 49 devices enabled Telnet and FTP by default, respectively. From the above results, we conclude that the presence of misconfigured devices was less driven by human errors of the owners and more by the choices of the manufacturers. The majority of owners were motivated to remediate the security risks once made aware of them.</abstract><pub>IEEE</pub><doi>10.1109/SP54263.2024.00117</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2375-1207 |
ispartof | 2024 IEEE Symposium on Security and Privacy (SP), 2024, p.2291-2309 |
issn | 2375-1207 |
language | eng |
recordid | cdi_ieee_primary_10646731 |
source | IEEE Electronic Library (IEL) |
subjects | analysis of device manuals Internet of Things IoT Manuals notifications Privacy Security Surveys surveys of owners and manufacturers |
title | Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T18%3A22%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Who%20Left%20the%20Door%20Open?%20Investigating%20the%20Causes%20of%20Exposed%20IoT%20Devices%20in%20an%20Academic%20Network&rft.btitle=2024%20IEEE%20Symposium%20on%20Security%20and%20Privacy%20(SP)&rft.au=Sasaki,%20Takayuki&rft.date=2024-05-19&rft.spage=2291&rft.epage=2309&rft.pages=2291-2309&rft.eissn=2375-1207&rft.coden=IEEPAD&rft_id=info:doi/10.1109/SP54263.2024.00117&rft_dat=%3Cieee_RIE%3E10646731%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9798350331301&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10646731&rfr_iscdi=true |