4.7 Article

A Large Scale Characterization of Device Uptimes

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TETC.2023.3271315

关键词

Analytics; measurements; shodan; uptime

向作者/读者索取更多资源

This paper provides a large-scale characterization of device uptimes from the perspectives of a Reddit forum and Shodan. The study reveals that users have certain assumptions about device uptimes and that there are devices with uptimes exceeding a certain threshold, posing risks to users in terms of security and performance. Additionally, routers have the longest uptimes among devices, and compromised devices have a positive correlation with uptimes.
Devices ages, also referred to as uptimes, convey information about systems, and are instrumental for patching and rejuvenation purposes. Knowing that a device is up for a long time suggests that it may be at risk or that degradation due to bugs may be in place. Nonetheless, there has been no systematic study of devices uptimes so far. The goal of this paper is to provide a large scale characterization of device uptimes, from the perspectives of a Reddit forum and Shodan. Among our findings, we identified that in the Reddit forum users typically assume that devices lingering up formore than 2 years are assumed to be long-lasting, and 25% of users assume that an uptime of 200 days is considered large. In addition, using Shodan we were able to identify a significant fraction of devices whose uptimes are larger than such threshold, posing security and performance risks to its users. We also found that routers are the devices with the largest uptimes, and that there is a positive correlation between devices tagged by Shodan as compromised and uptimes, with those devices having an average uptime beyond 250 days, that is roughly twice the average uptime in our dataset. In summary, our work suggests that it is viable to characterize uptimes from a system-wide viewpoint, and that such characterization sheds insight on the lifecycle of products and vulnerabilities.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Data Discovery Over Time Series From Star Schemas Based on Association, Correlation, and Causality

Wallace Anacleto Pinheiro, Geraldo Xexeo, Jano Moreira de Souza, Ana Barbara Sapienza Pinheiro

INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING (2020)

Article Computer Science, Information Systems

Collaborate Edge and Cloud Computing With Distributed Deep Learning for Smart City Internet of Things

Huaming Wu, Ziru Zhang, Chang Guan, Katinka Wolter, Minxian Xu

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

EEDTO: An Energy-Efficient Dynamic Task Offloading Algorithm for Blockchain-Enabled IoT-Edge-Cloud Orchestrated Computing

Huaming Wu, Katinka Wolter, Pengfei Jiao, Yingjun Deng, Yubin Zhao, Minxian Xu

Summary: This article explores how to achieve secure task offloading collaboration between edge computing and cloud computing using blockchain. By combining MEC and MCC, a blockchain-enabled IoT-Edge-Cloud computing architecture is proposed, providing faster computing services and stronger computational power while minimizing energy consumption and task response time.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Theory & Methods

Blockchain-enabled feedback-based combinatorial double auction for cloud markets

Xuyang Ma, Du Xu, Katinka Wolter

Summary: This paper proposes a distributed Feedback-based Combinatorial Multi-unit Double Auction mechanism backed by blockchain to establish a cloud resource market that not only produces high social welfare but also motivates participants to provide high-quality service.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores

Francois Boechat, Gabriel Ribas, Lucas Senos, Miguel Bicudo, Mateus Schulz Nogueira, Leandro Pfleger de Aguiar, Daniel Sadoc Menasche

Summary: The Common Vulnerability Scoring System score is the standard for evaluating the risk of software vulnerabilities and includes three temporal components: exploitability, remediation level, and report confidence. The discussion focuses on inferring report confidence from the first two components and highlights practical and conceptual issues in the usage of temporal risk scores.

IEEE SECURITY & PRIVACY (2021)

Article Computer Science, Theory & Methods

On Consortium Blockchain Consistency: A Queueing Network Model Approach

Tianhui Meng, Yubin Zhao, Katinka Wolter, Cheng-Zhong Xu

Summary: This article introduces a queueing network-based method for analyzing consistency properties of consortium blockchain protocols and applies it to the Hyperledger Fabric system. Using this method, the security properties of the ordering mechanism and the impact of delaying endorsement messages in consortium blockchain protocols are analyzed, along with deriving an upper bound of the damage an attacker could cause. Additionally, analytical derivations are employed to investigate both security and performance features, showing close agreement with measurements on a wide-area network testbed running the Hyperledger Fabric blockchain.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Information Systems

Constrained Multiobjective Optimization for IoT-Enabled Computation Offloading in Collaborative Edge and Cloud Computing

Guang Peng, Huaming Wu, Han Wu, Katinka Wolter

Summary: This article proposes three constrained multiobjective evolutionary algorithms (CMOEAs) for solving IoT-enabled computation offloading problems in collaborative edge and cloud computing networks. These algorithms consider time and energy consumption, and aim to improve efficiency and optimization through a combination of search algorithms and constraint handling mechanisms.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Theory & Methods

Energy-Efficient Offloading for DNN-Based Smart IoT Systems in Cloud-Edge Environments

Xing Chen, Jianshan Zhang, Bing Lin, Zheyi Chen, Katinka Wolter, Geyong Min

Summary: This study proposes a new energy-efficient offloading strategy for DNN-based smart IoT systems with deadline constraints in the cloud-edge environments. By designing a system energy consumption model and using a self-adaptive particle swarm optimization algorithm and genetic algorithm operators, the offloading decisions for DNN layers are efficiently made, leading to reduced energy consumption.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2022)

Article Computer Science, Information Systems

DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments

Min Xue, Huaming Wu, Guang Peng, Katinka Wolter

Summary: This research focuses on optimizing the offloading of large-scale DNN models in a local-edge-cloud collaborative environment with limited resources, proposing a new algorithm that efficiently achieves DNN offloading strategies while reducing latency, energy consumption, and cost.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Biology

SCREENER, an educational game for teaching the Drug Discovery and Development process

F. Noel, G. Xexeo, E. Mangeli, A. Mothe, P. Marques, J. Kritz, F. Blanchard, H. Vermelho, B. de Paiva

Summary: The article introduces a science game called "SCREENER," designed to educate players on the drug discovery and development process, suitable for students of pharmacology, medicinal chemistry, pharmacy, and medicine postgraduate programs. The game simulates the process from validating a target to registering a new drug with regulatory agencies, allowing for individual or monitored group play and incorporating decision making and challenge elements.

BRAZILIAN JOURNAL OF MEDICAL AND BIOLOGICAL RESEARCH (2021)

Article Public, Environmental & Occupational Health

Development of an Index for the Inspection of Aedes aegypti Breeding Sites in Brazil: Multi-criteria Analysis

Yuri Lima, Wallace Pinheiro, Carlos Eduardo Barbosa, Matheus Magalhaes, Miriam Chaves, Jano Moreira de Souza, Sergio Rodrigues, Geraldo Xexeo

Summary: The study proposes an Aedes aegypti inspection index through a multi-criteria analysis to assist public health practitioners in Brazil in preventing the appearance of new breeding sites. The priority for inspections should consider the number of sick people, medical evaluations, inspections, mosquito breeding sites, and days of absence from work.

JMIR PUBLIC HEALTH AND SURVEILLANCE (2021)

暂无数据