RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT

被引:0
|
作者
Huertas Celdran, Alberto [1 ]
Sanchez Sanchez, Pedro Miguel [2 ]
von der Assen, Jan [1 ]
Schenk, Timo [1 ]
Bovet, Gerome [3 ]
Martinez Perez, Gregorio [2 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat IfI, Commun Syst Grp CSG, CH-8050 Zurich, Switzerland
[2] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[3] Cyber Def Campus, Armasuisse Sci & Technol, CH-3602 Thun, Switzerland
关键词
Zero-day attacks mitigation; IoT; reinforcement learning; fingerprinting; MTD selection; STATE;
D O I
10.1109/TIFS.2024.3402055
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for RL, and iii) calculating the consumption of resources in single-board computers (SBC). Thus, the work at hand proposes an online RL-based framework that learns correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. The Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming < 1 MB of storage, $\approx 10$ % of RAM, and negligible CPU.
引用
收藏
页码:5520 / 5529
页数:10
相关论文
共 50 条
  • [1] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [2] A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
    Sharma, Vishal
    Lee, Kyungroul
    Kwon, Soonhyun
    Kim, Jiyoon
    Park, Hyungjoon
    Yim, Kangbin
    Lee, Sun-Young
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [3] IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT
    Ellouh, Mahmoud
    Ghaleb, Mustafa
    Felemban, Muhamad
    [J]. Proceedings - 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022, 2022, : 765 - 771
  • [4] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [5] Invisible and Forgotten: Zero-Day Blooms in the IoT
    Palani, Kartik
    Holt, Emily
    Smith, Sean
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [6] Defence against the dark art of zero-day attacks
    Madou, Matias
    [J]. Network Security, 2022, 2022 (11)
  • [7] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [8] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    [J]. 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [9] A Reinforcement Learning-Based Approach for Detection Zero-Day Malware Attacks on IoT System
    Ngo, Quoc-Dung
    Nguyen, Quoc-Huu
    [J]. ARTIFICIAL INTELLIGENCE TRENDS IN SYSTEMS, VOL 2, 2022, 502 : 381 - 394
  • [10] Protecting Embedded Systems from Zero-Day Attacks
    Taylor, Stephen
    [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168