欢迎来到报告吧! | 帮助中心 分享价值,成长自我!

报告吧

换一换
首页 报告吧 > 资源分类 > PDF文档下载
 

2018物联网安全年报.pdf

  • 资源ID:87573       资源大小:7.46MB        全文页数:121页
  • 资源格式: PDF        下载积分:15金币 【人民币15元】
快捷下载 游客一键下载
会员登录下载
三方登录下载: 微信开放平台登录 QQ登录  
下载资源需要15金币 【人民币15元】
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,下载共享资源
 
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,既可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

2018物联网安全年报.pdf

关于绿盟科技北京神州绿盟信息安全科技股份有限公司(简称绿盟科技)成立于2000年4月,总部位于北京。在国内外设有30多个分支机构,为政府、运营商、金融、能源、互联网以及教育、医疗等行业用户,提供具有核心竞争力的安全产品及解决方案,帮助客户实现业务的安全顺畅运行。基于多年的安全攻防研究,绿盟科技在网络及终端安全、互联网基础安全、合规及安全管理等领域,为客户提供入侵检测/防护、抗拒绝服务攻击、远程安全评估以及Web安全防护等产品以及专业安全服务。北京神州绿盟信息安全科技股份有限公司于2014年1月29日起在深圳证券交易所创业板上市交易。股票简称:绿盟科技 股票代码:300369关于上海交通大学信息内容分析技术国家工程实验室上海交通大学信息内容分析技术国家工程实验室于2009年3月由国家发改委批准建设。实验室主体建设于张江高科技园区,并于2014年6月通过国家验收。实验室主要围绕国家信息化建设对网络信息安全管理的需求,重点开展网络发布内容智能获取、多媒体内容主题提取与分类、基于内容的网络访问控制等关键技术方面的研究。同时,实验室积极开拓产业新增长点,加快技术成果转化,支撑国家有关职能部门和信息安全基础设施建设。近年来实验室聚焦物联网安全的密码理论、密钥管理、无线传感器网络安全、入侵检测、安全数据融合、安全定位、射频识别的隐私与安全、物联网嵌入式系统的安全设计,取得了一系列成果。相关成果已经在电信运营商、公安、网安、文化宣传等系统获得成功应用。关于广州大学网络空间先进技术研究院为加快推进高水平大学建设步伐,布局新的学科与科研大平台,学校围绕“5+2”平台引进并打造了一批高水平创新型科研团队,2017年7月份,学校成功引进了方滨兴院士,并以方院士团队为主体,成立了网络空间先进技术研究院。研究院下设4个研究所:网络安全研究所、物联网及安全研究所、大数据及安全研究所、先进计算技术研究所。物联网及安全研究所协同网络安全研究所、网络空间安全大数据分研究所,以物联网环境的个人用户隐私保护、平台安全的局限性、普遍存在的移动性使得追踪和资产管理面临挑战、设备的数量巨大使得常规的更新和维护操作面临挑战、基于云的操作使得边界安全不太有效等核心科学问题。在物联网中存在的隐私保护、认证、访问控制管理、数据保护、物理安全、设备保护和资产管理等物联网及安全方向开展深入学术研究及技术应用。特别声明为避免合作伙伴及客户数据泄露,所有数据在进行分析前都已经过匿名化处理,不会在中间环节出现泄露,任何与客户有关的具体信息,均不会出现在本报告中。2018物联网安全年报A目录执行摘要 ··································································································································································· 21. 2018年重大物联网安全事件回顾 ······················································································································ 51.1 暗网出现利用物联网设备的 DDoSaaS ··································································································································· 61.1.1 事件回顾 ····································································································································································································· 61.1.2 原理简述 ····································································································································································································· 71.1.3 小结 ············································································································································································································· 81.2 Hidenulln Seek 僵尸网络感染了 9 万台物联网设备 ··················································································································· 91.2.1 事件回顾 ····································································································································································································· 91.2.2 原理简述 ····································································································································································································· 91.2.3 小结 ··········································································································································································································· 101.3 IoTroop 针对金融机构的多起 DDoS 攻击活动 ···················································································································· 101.3.1 事件回顾 ··································································································································································································· 101.3.2 小结 ··········································································································································································································· 101.4 VPNFilter 感染约 50 万台物联网设备,或与国家行为有关 ······························································································ 111.4.1 事件回顾 ··································································································································································································· 111.4.2 原理简介 ··································································································································································································· 111.4.3 小结 ··········································································································································································································· 121.5 台积电生产线被勒索,停产损失超 10 亿 ···························································································································· 121.5.1 事件回顾 ··································································································································································································· 121.5.2 小结 ··········································································································································································································· 131.6 UPnProxy 脆弱性使 4.5 万个内网敞开,威胁众多企业和家庭 ························································································· 131.6.1 事件回顾 ··································································································································································································· 131.6.2 原理简介 ··································································································································································································· 131.6.3 小结 ··········································································································································································································· 141.7 20 万台路由器被黑导致内网设备恶意挖矿 ························································································································· 141.7.1 事件回顾 ··································································································································································································· 141.7.2 原理简介 ··································································································································································································· 151.7.3 小结 ··········································································································································································································· 151.8 总结 ···························································································································································································· 162018物联网安全年报B2. 物联网资产暴露与变化情况分析 ······················································································································ 172.1 暴露物联网资产概况 ······························································································································································· 182.2 暴露物联网资产的变化情况分析 ··········································································································································· 202.2.1 摄像头 ······································································································································································································· 212.2.2 路由器 ······································································································································································································· 232.2.3 VoIP 电话 ·································································································································································································· 232.3 物联网资产地址变化的原因分析 ··········································································································································· 242.3.1 变化资产使用拨号方式入网 ·································································································································································· 252.3.2 变化资产的 ASN 分布情况 ····································································································································································· 322.4 国内物联网资产真实暴露情况 ··············································································································································· 342.5 小结 ···························································································································································································· 353. 物联网资产风险和威胁统计 ····························································································································· 363.1 引言 ···························································································································································································· 373.2 异常物联网设备分析 ······························································································································································· 373.2.1 设备类型分析 ··························································································································································································· 383.2.2 攻击类型分析 ··························································································································································································· 393.2.3 开放端口分析 ··························································································································································································· 423.2.4 恶意挖矿行为分析 ··················································································································································································· 443.3 异常物联网设备的区域分布分析 ··········································································································································· 463.3.1 全球物联网设备的国家分布 ·································································································································································· 463.3.2 全球异常物联网设备国家分布 ······························································································································································ 473.3.3 国内物联网设备省份分布 ·······································································································································································513.3.4 国内异常物联网设备省份分布 ······························································································································································ 523.4 物联网恶意家族分析 ······························································································································································· 573.4.1 物联网恶意家族的样本维度分析 ·························································································································································· 583.4.2 物联网恶意家族的攻击维度分析 ·························································································································································· 603.4.3 典型恶意家族的详细分析 ·······································································································································································633.5 小结 ···························································································································································································· 672018物联网安全年报C4. 面向物联网设备的UPnP协议栈威胁分析 ······································································································· 684.1 引言 ···························································································································································································· 694.1.1 UPnP 技术简介 ························································································································································································ 694.1.2 UPnP 的工作流程 ···················································································································································································· 714.2 UPnP 协议栈的脆弱性与风险分析 ········································································································································ 734.2.1 UPnP 协议的脆弱性与风险分析 ···························································································································································· 734.2.2 UPnP 实现中的常见脆弱性与风险统计 ··············································································································································· 784.2.3 UPnP 服务的脆弱性与风险分析 ···························································································································································· 804.3 UPnP 暴露情况和风险统计 ···················································································································································· 824.4 UPnP 协议栈的威胁分析 ························································································································································ 884.4.1 利用 UPnP 的反射攻击分析 ··································································································································································· 884.4.2 UPnP 端口映射服务威胁分析 ································································································································································ 904.4.3 其他针对 UPnP 服务的恶意行为分析 ················································································································································ 1044.4.4 UPnP 服务扫描源分析 ·········································································································································································· 1074.5 小结 ·························································································································································································· 109附录1:文中部分名词释义 ································································································································· 110附录2:物联网设备常用端口与协议对照表 ······································································································ 112附录3:常见UPnP SDK关联漏洞 ····················································································································· 113参考文献 ·

注意事项

本文(2018物联网安全年报.pdf)为本站会员(浩浩)主动上传,报告吧仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知报告吧(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2017-2022 报告吧 版权所有
经营许可证编号:宁ICP备17002310号 | 增值电信业务经营许可证编号:宁B2-20200018  | 宁公网安备64010602000642号


收起
展开