A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow

被引:132
|
作者
Nobakht, Mehdi [1 ,2 ]
Sivaraman, Vijay [2 ]
Boreli, Roksana [3 ]
机构
[1] CSIRO, Data61, Canberra, ACT, Australia
[2] Univ New South Wales, Syndey, Australia
[3] Natl ICT Australia, Syndey, Australia
来源
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016) | 2016年
关键词
Internet of Things (IoT); Smart-home; SDN; Open-Flow; Machine learning; Anomaly detection; Attack mitigation; INTERNET; SECURITY; PRIVACY; THINGS;
D O I
10.1109/ARES.2016.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart devices are gaining popularity in our homes with the promise to make our lives easier and more comfortable. However, the increased deployment of such smart devices brings an increase in potential security risks. In this work, we propose an intrusion detection and mitigation framework, called IoT-IDM, to provide a network-level protection for smart devices deployed in home environments. IoT-IDM monitors the network activities of intended smart devices within the home and investigates whether there is any suspicious or malicious activity. Once an intrusion is detected, it is also capable of blocking the intruder in accessing the victim device on the fly. The modular design of IoT-IDM gives its users the flexibility to employ customized machine learning techniques for detection based on learned signature patterns of known attacks. Software-defined networking technology and its enabling communication protocol, OpenFlow, are used to realise this framework. Finally, a prototype of IoT-IDM is developed and the applicability and efficiency of proposed framework demonstrated through a real IoT device: a smart light bulb.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 50 条
  • [11] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [12] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [13] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [14] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [15] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57
  • [16] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006
  • [17] Host-based intrusion detection for advanced mobile devices
    Miettinen, Markus
    Halonen, Perttu
    Hatonen, Kimmo
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 72 - 76
  • [18] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [19] Adaptive critic designs for host-based intrusion detection
    Draelos, T
    Duggan, D
    Collins, M
    Wunsch, D
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1720 - 1725
  • [20] Mobile host-based intrusion detection and attack identification
    Jacoby, Grant A.
    Davis, Nathaniel J., IV
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) : 53 - 60