Specification-based IDS for securing RPL from topology attacks

被引:0
|
作者
Le, Anhtuan [1 ]
Loo, Jonathan [1 ]
Luo, Yuan [1 ]
Lasebae, Aboubaker [1 ]
机构
[1] Middlesex Univ, London N17 8HR, England
关键词
RPL; topology attack; rank attack; local repair attack; IDS; specification-based;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat - the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack and local repair attack. We also propose an IDS architecture using network monitor backbone, and describe its monitoring mechanisms through a RPL finite state machine implemented in each monitor node. We show that our system can effectively detect these routing operation threats with a reasonable overhead.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
    Le, Anhtuan
    Loo, Jonathan
    Chai, Kok Keong
    Aiash, Mahdi
    INFORMATION, 2016, 7 (02)
  • [2] A Specification-Based Detection for Attacks in the Multi-Area System
    Siu, Jun Yen
    Panda, Sanjib Kumar
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 1526 - 1531
  • [3] SQL-IDS: A Specification-based Approach for SQL-Injection Detection
    Kemalis, Konstantinos
    Tzouramanis, Theodoros
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2153 - 2158
  • [4] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [5] Preventing DoS Attacks in NGN Networks with Proactive Specification-Based Fuzzing
    Rontti, Tero
    Juuso, Anna-Maija
    Takanen, Ari
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (09) : 164 - 170
  • [6] Securing RPL Routing Protocol from Blackhole Attacks Using a Trust-based Mechanism
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2016, : 115 - 120
  • [7] A SPECIFICATION-BASED DATA MODEL
    GANDHI, M
    ROBERTSON, EL
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 645 : 194 - 209
  • [8] Securing RPL-Based Networks Against Version Number and Rank Attacks
    Khalfoune, Alaa Eddine
    Beghdad, Rachid
    ACTA INFORMATICA PRAGENSIA, 2024, 13 (03) : 340 - 358
  • [9] APPROACHES TO SPECIFICATION-BASED TESTING
    RICHARDSON, DJ
    OMALLEY, O
    TITTLE, C
    PROCEEDINGS OF THE ACM SIGSOFT 89: THIRD SYMPOSIUM ON SOFTWARE TESTING, ANALYSIS, AND VERIFICATION ( TAV 3 ), 1989, 14 : 86 - 96
  • [10] Specification-based Protocol Obfuscation
    Duchene, Julien
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    Le Guernic, Colas
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 478 - 489