Papers
Topics
Authors
Recent
2000 character limit reached

SIPHON: Towards Scalable High-Interaction Physical Honeypots

Published 10 Jan 2017 in cs.CR | (1701.02446v2)

Abstract: In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we focus on the adaptation of Honeypots for improving the security of IoTs. Low-interaction honeypots are used so far in the context of IoT. Such honeypots are limited and easily detectable, and thus, there is a need to find ways how to develop high-interaction, reliable, IoT honeypots that will attract skilled attackers. In this work, we propose the SIPHON architecture - a Scalable high-Interaction Honeypot platform for IoT devices. Our architecture leverages IoT devices that are physically at one location and are connected to the Internet through so-called wormholes distributed around the world. The resulting architecture allows exposing few physical devices over a large number of geographically distributed IP addresses. We demonstrate the proposed architecture in a large scale experiment with 39 wormhole instances in 16 cities in 9 countries. Based on this setup, six physical IP cameras, one NVR and one IP printer are presented as 85 real IoT devices on the Internet, attracting a daily traffic of 700MB for a period of two months. A preliminary analysis of the collected traffic indicates that devices in some cities attracted significantly more traffic than others (ranging from 600 000 incoming TCP connections for the most popular destination to less than 50000 for the least popular). We recorded over 400 brute-force login attempts to the web-interface of our devices using a total of 1826 distinct credentials, from which 11 attempts were successful. Moreover, we noted login attempts to Telnet and SSH ports some of which used credentials found in the recently disclosed Mirai malware.

Citations (101)

Summary

  • The paper proposes a scalable, high-interaction honeypot architecture that emulates numerous IoT devices via geographically distributed wormholes.
  • The implementation demonstrated the effectiveness of using cloud-hosted wormholes to capture significant attack traffic, with varied engagement across global locations.
  • Experimental analysis revealed a high volume of SSH attacks and brute-force login attempts, highlighting the importance of diverse device camouflage in IoT security.

SIPHON: Towards Scalable High-Interaction Physical Honeypots

The paper "SIPHON: Towards Scalable High-Interaction Physical Honeypots" presents a novel architecture designed to address security vulnerabilities in IoT devices by utilizing honeypots that are both scalable and high-interaction. This architecture, termed SIPHON, leverages geographically distributed wormholes to create the facade of numerous IoT devices using a minimal number of physical units. This essay explores the key components of the SIPHON architecture, implementation specifics, experimental findings, and conclusions drawn from the study.

Architecture and Implementation

SIPHON Framework

The SIPHON architecture is designed to capture high-interaction traffic in an IoT context. By employing wormholes, SIPHON extends the reach of physical IoT devices, allowing them to appear as if they are located in various global locales—all while residing in a single lab setup. Each wormhole serves as a proxy, redirecting traffic from its assigned IP address to the honeypot device, which consists of physical IoT components such as IP cameras. Figure 1

Figure 1: Distribution of TCP connections to wormholes according to their city.

This architecture is scalable, intending to model up to 100,000 service endpoints with minimal physical resources, scalable through cloud-hosted instances providing network tunneling via SSH.

Prototype and Experimentation

An implementation of the SIPHON architecture utilized a combination of IP cameras, an NVR, and a set of cloud-based wormholes spread across 16 cities in 9 countries, exposing 85 pseudo-distributed IoT devices with substantive traffic collection capabilities. Traffic analysis tools like tcpdump were employed to monitor and capture incoming connection data.

Traffic Analysis and Observations

Impact of Wormhole Locations

An analysis of incoming connections revealed significant variation in attacker interest based on geographical location. For instance, wormholes located in Frankfurt and Singapore attracted substantially more traffic than others, aligning with speculated regional attack preferences or available market for exploits in those areas.

Attack Patterns and Strategies

A noteworthy insight from the high-interaction setup was the preponderance of SSH-targeted probes over HTTP-based ones, suggesting the automated nature of many attacks. Over 400 brute-force login attempts using default or weak credentials were observed, resulting in several successful breaches, predominantly utilizing known credentials lists, exemplified by connections emanating heavily from IPs in China and the USA. Figure 2

Figure 2: Incoming connections according to their country of origin.

Shodan's Role in Attack Dynamics

A marked rise in connection attempts was noted post-listing on Shodan, with statistics indicating a significant surge in unsolicited traffic following the publication of device details by the search engine. This affirms Shodan's influence as an active tool in attackers' reconnaissance strategies. Figure 3

Figure 3: Impact of Shodan listing on no. of incoming connections.

Conclusions and Future Directions

SIPHON has provided valuable insights into attacker behaviors and preferences within a controlled IoT environment. The geographical spread of perceived device locations markedly affects attack volumes, with certain regions being targeted more aggressively. Outcomes indicate the significance of IoT device camouflage and emphasize the need for varied device representation to counter stratified attack strategies effectively.

The study postulates further expansion in incorporating diverse IoT gadgets and a more automated detection system to preempt attacks effectively. Such advancements could integrate seamlessly with broader security frameworks, enhancing the proactive defense mechanisms within IoT ecosystems.

In summation, the SIPHON architecture represents a substantive advancement in high-interaction, scalable honeypots for IoT devices, offering a foundation for future research and development in preemptive security measures against sophisticated network threats.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Explain it Like I'm 14

Overview

This paper is about making the internet safer by studying how hackers try to break into “smart” gadgets—like internet-connected cameras and printers. The researchers built a special trap (called a honeypot) that looks like many real devices spread around the world, even though they only had a handful of actual devices in one lab. Their system is called SIPHON, which stands for Scalable High-Interaction Physical Honeypots for IoT devices.

Key Objectives and Questions

The paper set out to answer simple, practical questions:

  • How can we build a realistic, large-scale trap for smart devices that skilled hackers will actually try to attack?
  • Can we do this using only a small number of real devices, while making them appear in many cities worldwide?
  • What kinds of attacks do these devices attract, and where do those attacks come from?
  • Do attackers behave differently depending on where they think the device is located?
  • Does being listed on Shodan (a search engine for internet-connected devices) change how much a device gets attacked?

How They Did It (Methods)

Think of a honeypot like a fake storefront designed to catch shoplifters—but in this case, it’s a real gadget (like a camera) that hackers can interact with. The trick is making lots of people find it and try to mess with it, all while the researchers watch safely.

Here’s the approach, explained with everyday ideas:

  • Real devices, many “front doors”: The team used a small number of actual IoT devices in their lab (around seven). Then they created many “wormholes”—these are like internet tunnels or forwarding lines with public IP addresses in different cities (for example, Frankfurt, London, Singapore). When someone tries to connect to the device in Frankfurt, the wormhole forwards that traffic back to the real device in the lab.
  • High-interaction: Because the devices are real, attackers can do real things (like logging in, moving a camera, viewing video), which keeps skilled hackers interested and gives researchers better data than simple fakes.
  • Scaling up: By combining a few real devices with many wormholes (public IPs from cloud providers like Amazon EC2, DigitalOcean, Linode), they made those few devices appear as 85 separate devices across 39 wormholes, in 16 cities, 9 countries.
  • Forwarding and safety: Traffic was forwarded using secure tunnels (like SSH), and the devices were isolated inside the lab network for safety. All the incoming and outgoing data was captured for analysis.
  • Shodan listing: Shodan is like Google for smart devices. The team watched how often their devices got attacked before and after the devices showed up on Shodan.

Main Findings and Why They Matter

The researchers found several important things. Here are the highlights:

  • Big interest after Shodan listing: Once a device was listed on Shodan, the number of attack attempts quickly went up, especially in the first week. This suggests attackers use Shodan to find targets fast.
  • Location matters: Devices “placed” (via wormholes) in some cities were attacked much more. Frankfurt got about 600,000 incoming TCP connections, while San Jose got around 50,000. This means attackers care about where they think a device is located.
  • Most attacks targeted SSH: About 97% of the incoming connections aimed at port 22 (SSH), which is commonly used for remote logins. Even if the camera’s web page was the main target for viewing video, attackers still heavily probed SSH—often with passwords linked to known malware like Mirai.
  • Brute-force logins: The team recorded over 400 brute-force login attempts (trying many passwords quickly) using 1,826 different usernames/passwords. Eleven attempts succeeded—and every successful login was on devices with easy or default passwords. Hard passwords worked: none were cracked.
  • Who and how: Over 70% of connections came from IP addresses located in China (note: attackers can route through any country, so this isn’t definitive). Many requests used common tools and browsers (Mozilla, Chrome) and scanning tools like Masscan. They also saw thousands of “Shellshock” attempts—an old trick to hijack systems.
  • Cameras are popular: One specific D-Link camera model received the most attention, likely because its flaws had been publicly reported.

Overall traffic was heavy: roughly 700 MB per day, totaling about 20 GB across two months.

Implications and Impact

This work shows a practical, affordable way to study real attacks on smart devices:

  • Better research, lower cost: By using a few real devices and many wormholes, researchers can observe genuine hacker behavior at scale without buying dozens of gadgets.
  • Realistic interactions attract skilled attackers: High-interaction honeypots (where cameras move and show live video) draw in serious attackers, revealing more about new or advanced techniques.
  • Shodan is a major driver: If a device is visible on Shodan, it’s quickly targeted. Device makers and owners should assume anything exposed to the internet will be found.
  • Strong passwords matter: Default or simple passwords get broken; strong, unique passwords held up.
  • Defenders can prioritize: Since some locations are attacked more, companies can focus extra monitoring where it counts. Security teams can also watch for heavy probing on common ports like SSH.

In short, SIPHON helps the security community learn how attackers operate against real IoT devices, so we can design better defenses and encourage safer device settings (like changing default passwords and limiting public exposure).

Collections

Sign up for free to add this paper to one or more collections.