RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT

被引:0
|
作者
Huertas Celdran, Alberto [1 ]
Sanchez Sanchez, Pedro Miguel [2 ]
von der Assen, Jan [1 ]
Schenk, Timo [1 ]
Bovet, Gerome [3 ]
Martinez Perez, Gregorio [2 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat IfI, Commun Syst Grp CSG, CH-8050 Zurich, Switzerland
[2] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[3] Cyber Def Campus, Armasuisse Sci & Technol, CH-3602 Thun, Switzerland
关键词
Zero-day attacks mitigation; IoT; reinforcement learning; fingerprinting; MTD selection; STATE;
D O I
10.1109/TIFS.2024.3402055
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for RL, and iii) calculating the consumption of resources in single-board computers (SBC). Thus, the work at hand proposes an online RL-based framework that learns correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. The Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming < 1 MB of storage, $\approx 10$ % of RAM, and negligible CPU.
引用
收藏
页码:5520 / 5529
页数:10
相关论文
共 50 条
  • [21] Cyber resilience recovery model to combat zero-day malware attacks
    Tran, Hiep
    Campos-Nanez, Enrique
    Fomin, Pavel
    Wasek, James
    [J]. COMPUTERS & SECURITY, 2016, 61 : 19 - 31
  • [22] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [23] An Attack Graph Based Procedure for Risk Estimation of Zero-Day Attacks
    Keramati, Marjan
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 723 - 728
  • [24] Zero-Day Evasion Attack Analysis on Race between Attack and Defense
    Kwon, Hyun
    Yoon, Hyunsoo
    Choi, Daeseon
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 805 - 807
  • [25] Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT
    Verma, Priyanka
    Bharot, Nitesh
    Breslin, John G.
    O'Shea, Donna
    Vidyarthi, Ankit
    Gupta, Deepak
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3856 - 3866
  • [26] Moving Target Defense Against Injection Attacks
    Zhang, Huan
    Zheng, Kangfeng
    Yan, Xiaodan
    Luo, Shoushan
    Wu, Bin
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 518 - 532
  • [27] Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
    Gayathri, Rajakumaran
    Usharani, Shola
    Mahdal, Miroslav
    Vezhavendhan, Rajasekharan
    Vincent, Rajiv
    Rajesh, Murugesan
    Elangovan, Muniyandy
    [J]. SENSORS, 2023, 23 (03)
  • [28] Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble
    Yasmeen, Kausar
    Adnan, Muhammad
    [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2023, 25 (04):
  • [29] Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble
    Kausar Yasmeen
    Muhammad Adnan
    [J]. Risk Management, 2023, 25
  • [30] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    [J]. ELECTRONICS, 2022, 11 (23)