Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

// // //
8/31/2017
04:15 PM
Terry Young
Terry Young
News Analysis-Security Now

Big IoT Security Benefits From Service Providers Thinking Small

It doesn't take many bad devices to wreck a network. Concentrating on a small number of miscreants can reap huge benefits for service providers.

Industry discussions about the Internet of Things (IoT) usually quote big numbers -- e.g., 30 billion connected devices by 2022 and a global IoT market valued at $14.4 trillion. For service providers, there is an urgent need to scale up, meet those new network requirements, and capture their share of the IoT market opportunity.

But big-scale strategies alone don't work when applied to IoT security. Mobile network operators in the IoT space, such as Telenor Connexion, have already identified that a very small number of misbehaving devices (less than 0.01 percent of the base) can create a signaling storm, resulting in significant congestion that can cascade to other networks. Hackers deploy the same tactics because, unlike service providers, hacker economics do not depend on large-scale success. Malicious actors only need a few successful infections to be economically viable or to disrupt critical service.

Hacker infrastructure investment and cost barriers are quite low. Bad actors use inexpensive, mass-scale techniques (e.g., email, automated bots, off-the-shelf exploit kits) to canvass large quantities of networked devices and locate vulnerable targets, but only need to infect a small number of devices or network elements (or even just one) in the right location or network to be economically viable or launch a successful network attack.

Finding those relatively "few" infected devices, and the malicious traffic associated with them, needs to be the primary objective of service provider network security strategies.

Hunting for "the few" may seem counterintuitive to service providers, where high performance and throughput are critical criteria in infrastructure equipment decisions. But a successful security posture for billions of IoT devices requires just that -- accurate and rapid identification of that small percentage of the total traffic attempting to infect devices, and of those devices already infected. Higher performance, without a truly effective threat prevention approach, simply gives malware a high-speed "free ride." And malware doesn't need a high "adoption rate" to create damage.

In a published example, researchers demonstrated that malware infection rates of less than 0.1 percent of the population focused on specific 911 centers can severely impair the availability of critical emergency services. In the research model, the malware caused infected devices to generate "false" calls to the 911 center. The added "false" calls, which require a longer response time, tie up call center resources and effectively make the service unavailable for other genuine emergency calls.

So how can service providers locate and stop the "few" when there will be billions of devices connecting to their networks -- most of which they have little control over? Endpoint protection alone (such as anti-malware software on cellphones) is insufficient -- most mobile subscribers simply won't use it, and it's not feasible for the majority of IoT devices.

A network-based prevention program is a more realistic solution. Service providers must be able to "see" and inspect their traffic to determine whether it is malicious and identify already-infected devices on their network to prevent hacker success. By thinking small -- that is, focusing on the minor percentage of traffic that is malicious, or identifying infected devices -- can service providers offer their subscribers and IoT providers a safe network free from infected devices and security breaches.

Related posts:

Terry Young is Senior Manager of Service Provider Product Marketing at Palo Alto Networks, where she is responsible for developing programming to communicate the business value of security for mobile network operators and other service providers.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.