SlideShare a Scribd company logo
1 of 25
Download to read offline
All Things Considered:
An Analysis of IoT Devices
on Home Networks
Saeid Shirazi
Table of Content
IoT Device Adoption and Distribution Security Posture of IoT Devices
Addressing IoT Security Challenges Future of IoT Security
IoT Definition
✓ smart televisions
✓ surveillance cameras
✓ work appliances
✓ home assistants
✓ etc.
• The widespread adoption of Internet-connected embedded devices in real-world homes
What is your estimate for the number of IoT devices in 2024?
Global Adoption of IoT Devices
• Widespread Adoption
• Impact on Daily Life
Avast Wifi Inspector
Perform internal network scans and checks devices for weak security
● Device identification
● Weak default credentials
● Vulnerability to known recent CVEs
○ EthernalBlue
Avast Wifi Inspector: Discovering Process
Open
Services
80,443,
23,53
21,22,23
80, 443,
1900,23
Port Service
23 Telnet
22 SSH
21 FTP
1900 UPnP
80 HTTP
443 HTTPS
Avast Wi-Fi Inspector: DeviceID Classes
Device Classes
Computer Router
Mobile Device Wearable
Game Console Home Automation
Storage Surveillance
Work Appliance(printer) Voice Assistant
Vehicle Media(TV & streamer)
Home Appliance Generic IoT(Toothbrush)
Network Rules
Protocol Field Pattern Type
DHCP ClassID (?i)SAMSUNG[-:_] Network[-:_]Printer Printer
mDNS Name (?i)_nanolead(?:api|ms)?.tcp.local. Lighting
UPnP Device Type .*hub2.* IoT Hub
HTTP Title (?i)Polycom – (?:SoundPoint IP) ? (?:SoundPoint IP)? VoIP Phone
What is the problem of this method?
Do you know any other alternative solutions?
Methodology
Determine device vendor, fit device into one of 14 device classes
● Network Rules(regex)
● Supervised ML
● Dataset: 15.5 Million homes, including 83 million devices
across 11 geographic regions.
● Trained on 500k Devices from real world scans
● 300K Labels from network rules
● 200K Manually labeled
● Tested on a set of 1k manually labeled unseen devices.
● Results: Accuracy: 96 , F1 Score: 0.8
Homes w/ IoT Devices
Region % Homes w/ IoT Device Median Devices per home
North America 66.3% 7
Western Europe 53.5% 4
Oceania 49.2 4
Central + South America 31.7 4
East Asia 30.8 3
Eastern Europe 25.2 3
Southeast Asia 21.7 4
Sub-Saharan Africa 19.7 3
North Africa/Middle East 19.1 3
Central Asia 17.3 2
South Asia 8.7 2
Discussion: What problems do you detect in the outcome statistics?!
What do you think regional variation indicates?
What do you believe is the most popular category of IoT devices?
Homes w/ IoT Devices
Device Type % of North American Homes
Media 43%
Work Appliance(ex, printer) 33%
Gaming Console 16%
Voice Assistant 10%
Surveillance 4%
Storages(NAS) 3%
Home Automation(ex. Nest) 3%
Wearable(Ex: Watch) 0.2%
Other IoT 0.4%
How can the security community work towards improving the
security of devices in these smaller regions while considering the
preferences for different vendors and device types?
Results
Home automation and voice assistants are only
prevalent (>1% of homes) in North America,
Western Europe, and Oceania.
Work Appliances are the most common device
type in East Asia/Sub-Saharan Africa.
2
Media devices are the most popular device
type in 7 of 11 regions
1
3
What factors do you think might explain the prevalence of work
appliances in these regions compared to others?
Vendor Dominance
❖ 90% of devices worldwide are produced by only 100 vendors!
❖ Three major of game console:
Microsoft, Sony, Nintendu.
❖ Voice assistant:
Amazon Echo and Google Home
Discussion: How do you see these results usefull in case of IoT lonegvity?
Regional Distribution of IoT Devices
• Device Preferences
• Vendor Dominance
• Market Implications
❖ Security challenges vary per region depending
on device preferences!
Security is hard to measure in such a heterogeneous ecosystem
North America: Smallest Vulnerable of Telnet Devices!
Western Europe: only 14% of FTP devices support weak credentials!
Sub-Saharan Africa: More than 55% are weak!
Southeast Asia: more than half of devices have a guessable password!
Weak Credentials
What strategies can be employed to address these
regional differences in weak credential usage?
What is the Role of Major Vendors in Security and Longevity?
Future of IoT Security
Evolving Security Landscape
• Dynamic Nature
• Anticipating Future Threats
• Regulatory Considerations
Thank You for Attention

More Related Content

Similar to All Things Considered: An Analysis of IoT Devices on Home Networks

Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
BbAOC
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
Cleber Gomes
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
rafa_el_souza
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
TouhemiJamel
 

Similar to All Things Considered: An Analysis of IoT Devices on Home Networks (20)

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation TrackIoTNEXT 2016 - SafeNation Track
IoTNEXT 2016 - SafeNation Track
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
2014: Mid-Year Threat Review
2014: Mid-Year Threat Review2014: Mid-Year Threat Review
2014: Mid-Year Threat Review
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
IoT-market-estimative
IoT-market-estimativeIoT-market-estimative
IoT-market-estimative
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXL
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017Homeland of Things Framework BSides Augusta 2017
Homeland of Things Framework BSides Augusta 2017
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
 

More from SaeidGhasemshirazi

More from SaeidGhasemshirazi (20)

Deep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai BotnetDeep Dive to Understanding the Mirai Botnet
Deep Dive to Understanding the Mirai Botnet
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot security
 
A Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdfA Novel Aprroach for smart contract audit.pdf
A Novel Aprroach for smart contract audit.pdf
 
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesIoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
 
تامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract Securityتامین امنیت در قراردادهای هوشمند | Smart Contract Security
تامین امنیت در قراردادهای هوشمند | Smart Contract Security
 
Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)Virtual sports club Presentation(Startup idea)
Virtual sports club Presentation(Startup idea)
 
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامینThe zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
 
Security in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g networkSecurity in sdn/nfv and 5 g network
Security in sdn/nfv and 5 g network
 
Business model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کارBusiness model canvas | بوم مدل کسب و کار
Business model canvas | بوم مدل کسب و کار
 
CyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model RadarCyberlLogitec Service Dominant Business Model Radar
CyberlLogitec Service Dominant Business Model Radar
 
Clubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوسClubhouse strategy | بررسی استراتژی کلاب هوس
Clubhouse strategy | بررسی استراتژی کلاب هوس
 
اختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتیاختلال و نفوذ در شبکه از طریق حفره های امنیتی
اختلال و نفوذ در شبکه از طریق حفره های امنیتی
 
انواع ارزیابی های امنیتی و مراحل تست و نفوذ
انواع ارزیابی های امنیتی و مراحل تست  و نفوذانواع ارزیابی های امنیتی و مراحل تست  و نفوذ
انواع ارزیابی های امنیتی و مراحل تست و نفوذ
 
Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)Android Penetration Testing(Android Security)
Android Penetration Testing(Android Security)
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statement
 
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهوتحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
تحلیل و بررسی استراتژِی های شرکت گوگل و یاهو
 
انواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنهاانواع مختلف شرکت ها و اطلاعات مربوط به آنها
انواع مختلف شرکت ها و اطلاعات مربوط به آنها
 
خلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامانخلاصه فصل سوم کتاب تست مامان
خلاصه فصل سوم کتاب تست مامان
 
Process mining error detection for security iot
Process mining error detection for security iotProcess mining error detection for security iot
Process mining error detection for security iot
 
Markets and Information
Markets and InformationMarkets and Information
Markets and Information
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 

All Things Considered: An Analysis of IoT Devices on Home Networks

  • 1. All Things Considered: An Analysis of IoT Devices on Home Networks Saeid Shirazi
  • 2. Table of Content IoT Device Adoption and Distribution Security Posture of IoT Devices Addressing IoT Security Challenges Future of IoT Security
  • 3. IoT Definition ✓ smart televisions ✓ surveillance cameras ✓ work appliances ✓ home assistants ✓ etc. • The widespread adoption of Internet-connected embedded devices in real-world homes
  • 4. What is your estimate for the number of IoT devices in 2024?
  • 5. Global Adoption of IoT Devices • Widespread Adoption • Impact on Daily Life
  • 6. Avast Wifi Inspector Perform internal network scans and checks devices for weak security ● Device identification ● Weak default credentials ● Vulnerability to known recent CVEs ○ EthernalBlue
  • 7. Avast Wifi Inspector: Discovering Process Open Services 80,443, 23,53 21,22,23 80, 443, 1900,23 Port Service 23 Telnet 22 SSH 21 FTP 1900 UPnP 80 HTTP 443 HTTPS
  • 8. Avast Wi-Fi Inspector: DeviceID Classes Device Classes Computer Router Mobile Device Wearable Game Console Home Automation Storage Surveillance Work Appliance(printer) Voice Assistant Vehicle Media(TV & streamer) Home Appliance Generic IoT(Toothbrush)
  • 9. Network Rules Protocol Field Pattern Type DHCP ClassID (?i)SAMSUNG[-:_] Network[-:_]Printer Printer mDNS Name (?i)_nanolead(?:api|ms)?.tcp.local. Lighting UPnP Device Type .*hub2.* IoT Hub HTTP Title (?i)Polycom – (?:SoundPoint IP) ? (?:SoundPoint IP)? VoIP Phone
  • 10. What is the problem of this method? Do you know any other alternative solutions?
  • 11. Methodology Determine device vendor, fit device into one of 14 device classes ● Network Rules(regex) ● Supervised ML ● Dataset: 15.5 Million homes, including 83 million devices across 11 geographic regions. ● Trained on 500k Devices from real world scans ● 300K Labels from network rules ● 200K Manually labeled ● Tested on a set of 1k manually labeled unseen devices. ● Results: Accuracy: 96 , F1 Score: 0.8
  • 12. Homes w/ IoT Devices Region % Homes w/ IoT Device Median Devices per home North America 66.3% 7 Western Europe 53.5% 4 Oceania 49.2 4 Central + South America 31.7 4 East Asia 30.8 3 Eastern Europe 25.2 3 Southeast Asia 21.7 4 Sub-Saharan Africa 19.7 3 North Africa/Middle East 19.1 3 Central Asia 17.3 2 South Asia 8.7 2 Discussion: What problems do you detect in the outcome statistics?!
  • 13. What do you think regional variation indicates?
  • 14. What do you believe is the most popular category of IoT devices?
  • 15. Homes w/ IoT Devices Device Type % of North American Homes Media 43% Work Appliance(ex, printer) 33% Gaming Console 16% Voice Assistant 10% Surveillance 4% Storages(NAS) 3% Home Automation(ex. Nest) 3% Wearable(Ex: Watch) 0.2% Other IoT 0.4%
  • 16. How can the security community work towards improving the security of devices in these smaller regions while considering the preferences for different vendors and device types?
  • 17. Results Home automation and voice assistants are only prevalent (>1% of homes) in North America, Western Europe, and Oceania. Work Appliances are the most common device type in East Asia/Sub-Saharan Africa. 2 Media devices are the most popular device type in 7 of 11 regions 1 3
  • 18. What factors do you think might explain the prevalence of work appliances in these regions compared to others?
  • 19. Vendor Dominance ❖ 90% of devices worldwide are produced by only 100 vendors! ❖ Three major of game console: Microsoft, Sony, Nintendu. ❖ Voice assistant: Amazon Echo and Google Home Discussion: How do you see these results usefull in case of IoT lonegvity?
  • 20. Regional Distribution of IoT Devices • Device Preferences • Vendor Dominance • Market Implications ❖ Security challenges vary per region depending on device preferences!
  • 21. Security is hard to measure in such a heterogeneous ecosystem North America: Smallest Vulnerable of Telnet Devices! Western Europe: only 14% of FTP devices support weak credentials! Sub-Saharan Africa: More than 55% are weak! Southeast Asia: more than half of devices have a guessable password! Weak Credentials
  • 22. What strategies can be employed to address these regional differences in weak credential usage?
  • 23. What is the Role of Major Vendors in Security and Longevity?
  • 24. Future of IoT Security Evolving Security Landscape • Dynamic Nature • Anticipating Future Threats • Regulatory Considerations
  • 25. Thank You for Attention