Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices

被引:16
|
作者
Ho, Jun-Won [1 ]
机构
[1] Seoul Womens Univ, Dept Informat Secur, Seoul 01797, South Korea
来源
IEEE ACCESS | 2018年 / 6卷
基金
新加坡国家研究基金会;
关键词
Code-reuse attacks; probabilistic packet inspection; sequential probability ratio test (SPRT);
D O I
10.1109/ACCESS.2018.2872044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial IoT devices are vulnerable to code-reuse attacks in which benign codes of these devices are reused for malicious activities. In the sense that adversary can compromise industrial IoT devices by means of code-reuse attacks and impair entire industrial IoT ecosystems through the compromised industrial IoT devices, it is very imperative to detect code-reuse attacks in industrial IoT devices. Although different types of code-reuse attack detection schemes have been devised in the literature, they are mainly system level or inefficient/vulnerable network level defense techniques. For the efficient and robust network level defense, we propose a scheme that detects code-reuse attacks efficiently and resiliently by incorporating the sequential probability ratio test (SPRT) with the probabilistic inspection on the packets incoming into industrial IoT devices. Through experimental and analytical study, we demonstrate that our proposed detection scheme resiliently and efficiently defends against code-reuse attacks in industrial IoT devices. In particular, our simulation results show that the SPRT with probabilistic packet inspection achieves at least 93.2% and 99.0% average detection rate for small and large set of code-reuse packets, respectively, while demanding below five samples for detection on an average. They also exhibit that it achieves at most 0.4% average false positives with below four samples on an average.
引用
收藏
页码:54343 / 54354
页数:12
相关论文
共 8 条
  • [1] Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
    Gionta, Jason
    Enck, William
    Larsen, Per
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 189 - 197
  • [2] The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
    Biondo, Andrea
    Conti, Mauro
    Davi, Lucas
    Frassetto, Tommaso
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1213 - 1227
  • [3] A deep hybrid learning model for detection of cyber attacks in industrial IoT devices
    Shahin, Mohammad
    Chen, F. Frank
    Hosseinzadeh, Ali
    Bouzary, Hamed
    Rashidifar, Rasoul
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2022, 123 (5-6): : 1973 - 1983
  • [4] A deep hybrid learning model for detection of cyber attacks in industrial IoT devices
    Mohammad Shahin
    F. Frank Chen
    Ali Hosseinzadeh
    Hamed Bouzary
    Rasoul Rashidifar
    The International Journal of Advanced Manufacturing Technology, 2022, 123 : 1973 - 1983
  • [5] Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning
    Kumar A.
    Singh D.
    International Journal of Information Technology, 2024, 16 (3) : 1365 - 1376
  • [6] A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems
    Mohammad Shahin
    F. Frank Chen
    Hamed Bouzary
    Ali Hosseinzadeh
    Rasoul Rashidifar
    The International Journal of Advanced Manufacturing Technology, 2022, 123 : 2017 - 2029
  • [7] A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems
    Shahin, Mohammad
    Chen, F. Frank
    Bouzary, Hamed
    Hosseinzadeh, Ali
    Rashidifar, Rasoul
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2022, 123 (5-6): : 2017 - 2029
  • [8] Efficient IoT Devices Localization Through Wi-Fi CSI Feature Fusion and Anomaly Detection
    Li, Yan
    Yang, Jie
    Shih, Shang-Ling
    Shih, Wan-Ting
    Wen, Chao-Kai
    Jin, Shi
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39306 - 39322