It’s not just in people’s homes that gadgets with poorly maintained security features pose a problem. In fact, the stakes are often much higher for businesses and organizations that use and rely on smart devices if an intruder gets through and creates havoc.
Emmanouil Vasilomanolakis points out that the healthcare industry is a good example: “Hospitals use more and more devices that need internet connectivity. If these devices are hacked and stop functioning, we may have a life and death situation.”
He explains that even cheap devices such as surveillance cameras for your home that can’t do much can be powerful tools for hackers – especially if they gain access to a large number of devices at the same time and use them to stage an attack on another target:
“If you can access only one device, it’s not a very powerful attack. But of course, if you can use one million devices, that creates a serious security threat.”
Such attacks can be used to e.g., force authorities’ websites offline, as was seen when Chinese hackers managed to temporarily force Taiwanese government websites offline during the visit of US speaker of the House of Representatives, Nancy Pelosi, to Taiwan in August. Hackers can also use it to cause significant disruption to commercial sites, effectively blocking actual customers from purchasing goods for periods of time.
A more finely meshed safety net
Commercial services are already available that allow users to scan the internet and identify internet-connected devices. Emmanouil Vasilomanolakis aims to create a much more finely meshed safety net that scans and detects only actual digital ghost ships while omitting properly maintained gadgets.
The system will also be trained to avoid so-called honeypots and other false positives. A honeypot is a detection system that developers create to attract attackers to a secure system to study their behaviour.
The researchers will investigate novel ways of creating network signatures of digital ghost ships. A network signature is a footprint that has been left following unauthorized access. The aim is to enrich these signatures with device fingerprinting capabilities. Collecting such fingerprints provides information about the software and hardware of the device in question, making it easier to identify its type.
DTU will collaborate with the University of Cambridge for this part of the project.
Humans – the weakest link
An essential component in creating the best method for detecting digital ghost ships is getting inside the minds of those who use smart devices to understand how they use them.
“People in cyber security have said for years that it’s one thing that we can improve the technology and keep updating devices and create more secure software and devices. But on the other hand, you have the humans themselves, and many experts would agree that humans are usually the weakest link,” Emmanouil Vasilomanolakis says.
Therefore, an important project partner is the University of Colorado, where researchers have extensive expertise in cyber security psychology. Research in this field aims to understand the usual pitfalls that both administrators and ordinary people fall into when dealing with smart devices.
“The more we understand about how humans think and behave, the more we can see how we as researchers can find solutions that are easier for ordinary people to use instead of creating very technical things that work theoretically but practically don’t make much sense,” Emmanouil Vasilomanolakis explains.
Take the example of an influential YouTuber with millions of followers. “If we find a tutorial for a device they have posted where they say: ‘Just set up the device with this password and change it later’ – it would be interesting to find out whether there are actually millions of devices set up with such a password,” he says.