{"id":"https://openalex.org/W2785945928","doi":"https://doi.org/10.1109/pimrc.2017.8292628","title":"A first empirical look on internet-scale exploitations of IoT devices","display_name":"A first empirical look on internet-scale exploitations of IoT devices","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2785945928","doi":"https://doi.org/10.1109/pimrc.2017.8292628","mag":"2785945928"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292628","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006256635","display_name":"Mario Galluscio","orcid":null},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mario Galluscio","raw_affiliation_strings":["Cyber Threat Intelligence Lab, Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Cyber Threat Intelligence Lab, Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054854811","display_name":"Nataliia Neshenko","orcid":"https://orcid.org/0000-0002-8404-3475"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nataliia Neshenko","raw_affiliation_strings":["Cyber Threat Intelligence Lab, Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Cyber Threat Intelligence Lab, Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039079298","display_name":"Elias Bou\u2010Harb","orcid":"https://orcid.org/0000-0001-8040-4635"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elias Bou-Harb","raw_affiliation_strings":["Cyber Threat Intelligence Lab, Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Cyber Threat Intelligence Lab, Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040580407","display_name":"Yongliang Huang","orcid":"https://orcid.org/0000-0002-0854-4489"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yongliang Huang","raw_affiliation_strings":["Cyber Threat Intelligence Lab, Florida Atlantic University, United States"],"affiliations":[{"raw_affiliation_string":"Cyber Threat Intelligence Lab, Florida Atlantic University, United States","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022742519","display_name":"Nasir Ghani","orcid":"https://orcid.org/0000-0002-9475-7439"},"institutions":[{"id":"https://openalex.org/I2613432","display_name":"University of South Florida","ror":"https://ror.org/032db5x82","country_code":"US","type":"education","lineage":["https://openalex.org/I2613432"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nasir Ghani","raw_affiliation_strings":["Florida Center for Cybersecurity and University of South Florida, United States"],"affiliations":[{"raw_affiliation_string":"Florida Center for Cybersecurity and University of South Florida, United States","institution_ids":["https://openalex.org/I2613432"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058298121","display_name":"Jorge Crichigno","orcid":"https://orcid.org/0000-0002-6705-5300"},"institutions":[{"id":"https://openalex.org/I155781252","display_name":"University of South Carolina","ror":"https://ror.org/02b6qw903","country_code":"US","type":"education","lineage":["https://openalex.org/I155781252"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jorge Crichigno","raw_affiliation_strings":["University of South Carolina, United States"],"affiliations":[{"raw_affiliation_string":"University of South Carolina, United States","institution_ids":["https://openalex.org/I155781252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032243366","display_name":"Georges Kaddoum","orcid":"https://orcid.org/0000-0002-5025-6624"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["Ecole de Technologie Sup\u00e9rieure (ETS), Universit\u00e9 du Qu\u00e9bec, Canada"],"affiliations":[{"raw_affiliation_string":"Ecole de Technologie Sup\u00e9rieure (ETS), Universit\u00e9 du Qu\u00e9bec, Canada","institution_ids":["https://openalex.org/I9736820"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5006256635"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":1.8642,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87511066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7480359077453613},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6674500107765198},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.6148369908332825},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4795953333377838},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3908610939979553},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3613850474357605},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35171759128570557},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.10098224878311157},{"id":"https://openalex.org/keywords/cartography","display_name":"Cartography","score":0.06626021862030029}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7480359077453613},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6674500107765198},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.6148369908332825},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4795953333377838},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3908610939979553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3613850474357605},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35171759128570557},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.10098224878311157},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.06626021862030029}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pimrc.2017.8292628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292628","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},{"id":"pmh:oai:espace2.etsmtl.ca:16003","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Compte rendu de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W85139466","https://openalex.org/W148447563","https://openalex.org/W1983442091","https://openalex.org/W2005043824","https://openalex.org/W2040146912","https://openalex.org/W2062383334","https://openalex.org/W2111404412","https://openalex.org/W2111619626","https://openalex.org/W2119046642","https://openalex.org/W2119812052","https://openalex.org/W2123070675","https://openalex.org/W2129368140","https://openalex.org/W2168154523","https://openalex.org/W2170924378","https://openalex.org/W2293605433","https://openalex.org/W2343978497","https://openalex.org/W2354520588","https://openalex.org/W2358552375","https://openalex.org/W2360903897","https://openalex.org/W2402560368","https://openalex.org/W2408302068","https://openalex.org/W2550839948","https://openalex.org/W2576765166","https://openalex.org/W2579739707","https://openalex.org/W2586432806","https://openalex.org/W2598947300","https://openalex.org/W2613843087","https://openalex.org/W6603426847","https://openalex.org/W6678042037","https://openalex.org/W6706876442"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285201139"],"abstract_inverted_index":{"Technological":[0],"advances":[1],"and":[2,111,116,129,148,154,193],"innovative":[3],"business":[4],"models":[5],"led":[6],"to":[7,47,65,71,91,120,132,146,220,229],"the":[8,11,15,18,34,39,72,93,101,173,176,197,206,210,214],"modernization":[9],"of":[10,17,20,28,61,74,95,103,209],"cyber-physical":[12],"concept":[13],"with":[14],"realization":[16],"Internet":[19,135],"Things":[21],"(IoT).":[22],"While":[23],"IoT":[24,67,96,105,123,152,167,180,211,231],"envisions":[25],"a":[26,87,162],"plethora":[27],"high":[29],"impact":[30],"benefits":[31],"in":[32,69,172,184],"both,":[33],"consumer":[35],"as":[36,38,190,226,228],"well":[37,227],"control":[40],"automation":[41],"markets,":[42],"unfortunately,":[43],"security":[44,57],"concerns":[45],"continue":[46],"be":[48,221],"an":[49,118],"afterthought.":[50],"Several":[51],"technical":[52],"challenges":[53],"impede":[54],"addressing":[55],"such":[56,151,189,203],"requirements,":[58],"including,":[59],"lack":[60],"empirical":[62,236],"data":[63,115],"related":[64],"various":[66],"devices":[68,124,153,168,181],"addition":[70],"shortage":[73],"actionable":[75,215],"attack":[76],"signatures.":[77],"In":[78],"this":[79],"paper,":[80],"we":[81,84],"present":[82],"what":[83],"believe":[85],"is":[86],"first":[88],"attempt":[89],"ever":[90],"comprehend":[92],"severity":[94],"maliciousness":[97],"by":[98,141],"empirically":[99],"characterizing":[100],"magnitude":[102],"Internet-scale":[104],"exploitations.":[106],"We":[107,137,200],"draw":[108],"upon":[109],"unique":[110],"extensive":[112],"darknet":[113],"(passive)":[114],"develop":[117],"algorithm":[119],"infer":[121],"unsolicited":[122],"which":[125],"have":[126],"been":[127],"compromised":[128],"are":[130,170,196,218],"attempting":[131],"exploit":[133],"other":[134],"hosts.":[136],"further":[138],"perform":[139],"correlations":[140],"leveraging":[142],"active":[143],"Internet-wide":[144],"scanning":[145],"identify":[147],"report":[149],"on":[150],"their":[155],"hosting":[156],"environments.":[157],"The":[158],"generated":[159,216],"results":[160,204],"indicate":[161],"staggering":[163],"11":[164],"thousand":[165],"exploited":[166],"that":[169,179,202],"currently":[171],"wild.":[174],"Moreover,":[175],"outcome":[177],"pinpoints":[178],"embedded":[182],"deep":[183],"operational":[185],"Cyber-Physical":[186],"Systems":[187],"(CPS)":[188],"manufacturing":[191],"plants":[192],"power":[194],"utilities":[195],"most":[198],"compromised.":[199],"concur":[201],"highlight":[205],"wide-spread":[207],"insecurities":[208],"paradigm,":[212],"while":[213],"inferences":[217],"postulated":[219],"leveraged":[222],"for":[223],"prompt":[224],"mitigation":[225],"facilitate":[230],"forensic":[232],"investigations":[233],"using":[234],"real":[235],"data.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
