USB Rubber Ducky Hunter A Proactive Defense Against Malicious USB Attacks Domain: Cybersecurity | IEEE Conference Publication | IEEE Xplore

USB Rubber Ducky Hunter A Proactive Defense Against Malicious USB Attacks Domain: Cybersecurity


Abstract:

In the dynamic realm of cybersecurity threats, Bad USB attacks pose a significant risk to high-security environments. This paper introduces an innovative defense mechanis...Show More

Abstract:

In the dynamic realm of cybersecurity threats, Bad USB attacks pose a significant risk to high-security environments. This paper introduces an innovative defense mechanism, utilizing proactive keystroke speed monitoring, to bolster systems against these advanced threats. The system's adaptability is showcased through four distinct modes: normal, paranoid, sneaky, and log-only—implemented via Python programs, offering a versatile defense against varying malicious intent levels. Inspired by the tactics of notorious Bad USB devices like rubber duckies, our solution leverages rapid execution characteristics to preemptively identify and mitigate suspicious keystroke patterns. Rigorous experimentation validates the system's efficacy, demonstrating a robust defense that surpasses Bad USB attacks' sophistication while dynamically adapting to real-world scenarios. The comprehensive methodology outlined in this paper not only confirms the system's effectiveness but also highlights its potential to significantly enhance cybersecurity resilience. Striking a balance between precision and flexibility, this approach represents a noteworthy advancement in countering Bad USB threats, addressing current challenges and laying the groundwork for future proactive cybersecurity measures.
Date of Conference: 03-04 May 2024
Date Added to IEEE Xplore: 12 July 2024
ISBN Information:
Conference Location: Gurugram, India

I. Introduction

In the digital age, where the ubiquitous USB flash drive is a common sight in both personal and professional environments, an inconspicuous device known as the “USB Rubber Ducky” has emerged as a potent tool for executing keyboard-based attacks on target computer systems. This tiny device, resembling an innocuous USB flash drive, has the remarkable ability to emulate a keyboard and inject keystrokes into a connected computer at an astonishing rate. While the USB Rubber Ducky serves legitimate purposes, such as security testing and ethical hacking, it has also raised concerns about potential misuse and the exploitation of this technology for malicious intent.

Contact IEEE to Subscribe

References

References is not available for this document.