Chrome Extension
WeChat Mini Program
Use on ChatGLM

Characterizing and Analyzing LEO Satellite Cyber Landscape: A Starlink Case Study

ICC 2024 - IEEE International Conference on Communications(2024)

Cited 0|Views0
No score
Abstract
Ushering into the ‘New Space Era’, characterized by a reduction in launch expenses and simultaneous proliferation of commercial and governmental entities involved, the prominence of Low Earth Orbit (LEO) satellite technology in the sphere of Internet connectivity has risen to the forefront. However, due to current limitations under the overarching principle of ‘security-through-obscurity’, few to no research efforts have shed light on the intricacies of these networks. To this end, this paper harnesses a multilayer empirical approach in an effort to conduct an exploratory characterization and scrutiny of the cybersecurity landscape of Starlink, the largest LEO network. Using our built-in arsenal of data feeds, composed of large dark IP addresses, passive measurement sensors, BGP collectors, coupled with publicly available sources, we unveil on the Starlink cyberspace (i) Internet-scale exploitations, (ii) illicit scanning events originating from 8,675 unique Starlink end-users, (iii) suspicious Port 0 and IKE scans, (iv) Mirai-based infections, (v) source address spoofing, (vi) 8,714 vulnerabilities ranging between medium and critical, and (vii) interesting RTBH announcements associated with possible mitigation techniques.
More
Translated text
Key words
Low Earth Orbit,Mitigation Techniques,Passive Measurements,Scan Event,Defense Mechanisms,Search Engine,Global Scale,Parsing,Public Data,Disaster Management,Presence Points,Current Landscape,Security Analysis,Denial Of Service,Malicious Activities,Satellite Networks,Security Posture,Class Of Attacks,Scanning Behavior
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined