Attack Identification Framework for IoT Devices

被引:8
|
作者
Danda, Jagan Mohan Reddy [1 ]
Hota, Chittaranjan [1 ]
机构
[1] Birla Inst Technol & Sci Pilani, Hyderabad Campus, Telangana 500078, India
关键词
P2P; Detection; Embedded devices; IDS;
D O I
10.1007/978-81-322-2752-6_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the emergence of Internet and embedded computing, Internet of Things (IoT) is currently becoming an area of interest amongst researches. IoT enable interconnection of embedded devices capable of running application like smart grid, smart traffic control, remote health monitoring etc. As the IoT devices can be connected virtually as well as physically, cyber attacks are likely to become a major threat. An attacker who have an access to the on-board network connecting IoT devices or appliances can spy on people, can inject malicious code into these embedded devices creating serious security concerns. In this work, we propose a framework to monitor security threats possible on IoT devices. The framework consists of several modules like data capture, anomaly detector and alert generator. The data capture module collects the application level data, transport and network headers of the traffic that goes into the IoT device. The anomaly detector module uses a signature based approach to detect threats. The proposed framework is tested on a testbed comprising of Arduino boards with Wiznet Ethernet shield as the IoT device communicate with Samsung Android smart-phone over a bridge connected through WiFi. We ran SNORT Intrusion Detector on the bridge with rules for generating alerts for intrusion.
引用
收藏
页码:505 / 513
页数:9
相关论文
共 50 条
  • [1] Authorisation, attack detection and avoidance framework for IoT devices
    Sudhakaran, Pradeep
    Malathy, Chidambaranathan
    [J]. IET NETWORKS, 2020, 9 (05) : 209 - 214
  • [2] IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source
    Abbas, Syed Ghazanfar
    Husnain, Muhammad
    Fayyaz, Ubaid Ullah
    Shahzad, Farrukh
    Shah, Ghalib A.
    Zafar, Kashif
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1403 - 1410
  • [3] Hierarchical and On-Demand Attack Defence Framework for IoT Devices
    Sudhakaran, Pradeep
    Kaliyaperumal, Manikannan
    Senthilkumar, T.
    Jeya, R.
    Sowmiya, B.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] Towards a Real Time Framework for Monitoring IoT Devices for Attack Detection Vision paper
    Bonilla, Rafael, I
    Abad, Cristina L.
    [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 699 - 703
  • [5] A Lightweight Replay Attack Detection Framework for Battery Depended IoT Devices Designed for Healthcare
    Rughoobur, Paavan
    Nagowah, Leckraj
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 811 - 817
  • [6] A Framework for Identification and Classification of IoT Devices for Security Analysis in Heterogeneous Network
    Zahid, Hafiz Muhammad
    Saleem, Yasir
    Hayat, Faisal
    Khan, Farrukh Zeeshan
    Alroobaea, Roobaea
    Almansour, Fahad
    Ahmad, Muneer
    Ali, Ihsan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] A machine learning based framework for IoT devices identification using web traffic
    Hussain, Sajjad
    Aslam, Waqar
    Mehmood, Arif
    Choi, Gyu Sang
    Ashraf, Imran
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10
  • [8] IAF: IoT Attack Framework and Unique Taxonomy
    Bhardwaj, Akashdeep
    Kumar, Manoj
    Stephan, Thompson
    Shankar, Achyut
    Ghalib, Muhammad Rukunuddin
    Abujar, Sheikh
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (02)
  • [9] A method of classifying IoT devices based on attack sensitivity
    Wang, Huifen
    Guo, Dong
    Wei, Jinrui
    Li, Jinze
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [10] Automatic Verification and Execution of Cyber Attack on IoT Devices
    Faeroy, Fartein Lemjan
    Yamin, Muhammad Mudassar
    Shukla, Ankur
    Katt, Basel
    [J]. SENSORS, 2023, 23 (02)