This is a wider card with supporting text below as a natural lead-in to additional content. This content is a little bit longer.
alert
id# | Start Time | Threat level | click to see more Details |
---|---|---|---|
1000 | 18:32 | 25 | |
1001 | 18:50 | 75 | |
1002 | 19:20 | 50 |
Detected network activity is indicative of your device connecting to a malicious command-and-control server. Your device has likely been compromised by an attacker and you should take steps to secure it as soon as possible.
question and instruction:
Name of device | privacy sensitivity | security sensitivity | Recent severest alert | Block this device |
---|---|---|---|---|
AC | low | medium | id: 9343, date: 12/22 18:32, severity: 40 | |
Camera | high | low | id: 9443, date: 12/22 14:32, severity: 60 | |
TV | low | low | id: 9443, date: 12/22 19:32, severity: 30 |
Network activity shows a device scanning your home network and gathering informaiton about other devices on your network. May be indicative of an attacker looking for other devices to exploit.
At this stage, the hacker aims to gain your credentials and access to your devices. They typically do so by including but not limited to sending phishing links and emails and brute force guessing password of your devices, sending fake webpages, poisoning your DNS servers.
Now the hacker can do whatever it wants. It can install malware on your device and make it part of his botnet. It can eavesdrop and steal your private information. It can prevent your device from functioning correctly...
detects Horizontal and Vertical port scans.
module to check for ARP scans in ARP traffic.
checks if each IP is in a list of malicious IPs.
lookup IP address on VirusTotal.
detects command and control channels using recurrent neural network and the stratosphere behavioral letters.
find malicious behaviour in each flow. Current measures are: long duration of the connection, successful ssh.
detect malicious flows using machine learning.
There are many reasons. But the most critical one is IOT devices' intrinsic limited hardware resource and computational power. Therefore, when design IoT devices, there are constraint with many aspects such as communication protocols, encryption algorithm which are integral to security.
Privacy. You definitely don't want your camera be accessible to anyone except you right?
Security. What if your door can be controlled by mobile devices such as your phone?
Social responsibility. You compromised devices could weaponize cyber-criminal. We all enjoy the surfing internet. Accordingly, we should take the responsibility at least for our own devices by not allowing them to disturb public internet services.
Always use your own password instead of the default one.
Don't let your device connect to internet if it does not need to function.
Isolate your devices in a separate local area network.