Graph-Based IoT Microservice Security

被引:0
|
作者
Pahl, Marc-Oliver [1 ]
Aubet, Francois-Xavier [1 ]
Liebald, Stefan [1 ]
机构
[1] Tech Univ Munich, Munich, Germany
关键词
IoT; security; passive monitoring; firewall; microservices; autonomous service management; unattended nodes;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of Microservices (mu S). The mu Ss inherently process data that affects the privacy, safety, and security of its users. IoT service security is a key challenge. Most state of the art providing IoT system security is policy based. We showcase a graph-based access control that runs as module on IoT nodes, or in the network. Our solution intercepts and firewalls inter-service communication. It automatically creates a model of legitimate communication relationships. The model is interactively updated via a simple-to-understand interface. Our solution adds inevitable IoT security to existing IoT systems.
引用
收藏
页数:3
相关论文
共 50 条
  • [31] An attack graph-based probabilistic computing approach of network security
    Ye, Yun
    Xu, Xi-Shan
    Jia, Yan
    Qi, Zhi-Chang
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
  • [32] DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning
    Zhang, Chenxi
    Peng, Xin
    Sha, Chaofeng
    Zhang, Ke
    Fu, Zhenqing
    Wu, Xiya
    Lin, Qingwei
    Zhang, Dongmei
    [J]. 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 623 - 634
  • [33] Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System
    Huang, Jun
    Yang, Yang
    Yu, Hang
    Li, Jianguo
    Zheng, Xiao
    [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 66 - 78
  • [34] Threat Analysis of IoT Security Knowledge Graph Based on Confidence
    Zhang, Shuqin
    Zhang, Minzhi
    Li, Hong
    Bai, Guangyao
    [J]. EMERGING TECHNOLOGIES FOR EDUCATION, SETE 2021, 2021, 13089 : 254 - 264
  • [35] A Graph-based Trust-enhanced Recommender System for Service Selection in IOT
    Nizamkari, Navya Sri
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 358 - 362
  • [36] Attack Graph-Based Quantitative Assessment for Industrial Control System Security
    Zhang, Yaofang
    Wang, Bailing
    Wu, Chenrui
    Wei, Xiaojie
    Wang, Zibo
    Yin, Guohua
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 1748 - 1753
  • [37] A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT
    Jia, Yizhen
    Xiao, Yinhao
    Yu, Jiguo
    Cheng, Xiuzhen
    Liang, Zhenkai
    Wan, Zhiguo
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1493 - 1501
  • [38] A Graph-Based Modular Coding Scheme Which Achieves Semantic Security
    Wiese, Moritz
    Boche, Holger
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 822 - 826
  • [39] Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security
    Wang, Cheng
    Zhu, Hangyu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2703 - 2718
  • [40] Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications
    Abawajy J.
    Kelarev A.V.
    Miller M.
    Ryan J.
    [J]. Mathematics in Computer Science, 2015, 9 (2) : 127 - 137