Identifying attack signatures for the Internet of Things An IP flow based approach

被引:0
|
作者
Vieira, Leandro [1 ,2 ]
Santos, Leonel [1 ,2 ,3 ]
Goncalves, Ramiro [3 ,4 ]
Rabadao, Carlos [1 ,2 ]
机构
[1] Polytech Inst Leiria, Sch Technol & Management, Leiria, Portugal
[2] Polytech Inst Leiria, Comp Sci & Commun Res Ctr CIIC, Leiria, Portugal
[3] Univ Tras Os Montes & Alto Douro, Vila Real, Portugal
[4] INESC TEC, Porto, Portugal
关键词
Security; network attacks; flow monitoring; network intrusion detection; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] MQTT flow signatures for the Internet of Things
    Leal, Roberto
    Santos, Leonel
    Vieira, Leandro
    Goncalves, Ramiro
    Rabadao, Carlos
    [J]. 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
  • [2] CoAP flow signatures for the Internet of Things
    Canuto, Luis
    Santos, Leonel
    Vieira, Leandro
    Goncalves, Ramiro
    Rabadao, Carlos
    [J]. 2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2019,
  • [3] An Attack Tree Based Risk Evaluation Approach For The Internet of Things
    Asif, Waqar
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,
  • [4] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    [J]. 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [5] SNAIL: AN IP-BASED WIRELESS SENSOR NETWORK APPROACH TO THE INTERNET OF THINGS
    Hong, Sungmin
    Kim, Daeyoung
    Ha, Minkeun
    Bae, Sungho
    Park, Sang Jun
    Jung, Woo-Young
    Kim, Jae-Eon
    [J]. IEEE WIRELESS COMMUNICATIONS, 2010, 17 (06) : 34 - 42
  • [6] Defending Against New-Flow Attack in SDN-Based Internet of Things
    Xu, Tong
    Gao, Deyun
    Dong, Ping
    Zhang, Hongke
    Foh, Chuan Heng
    Chao, Han-Chieh
    [J]. IEEE ACCESS, 2017, 5 : 3431 - 3443
  • [7] A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
    Wang, Huan
    Chen, Zhanfang
    Zhao, Jianping
    Di, Xiaoqiang
    Liu, Dan
    [J]. IEEE ACCESS, 2018, 6 : 8599 - 8609
  • [8] Security Challenges in the IP-based Internet of Things
    Heer, Tobias
    Garcia-Morchon, Oscar
    Hummen, Rene
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Wehrle, Klaus
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 527 - 542
  • [9] Security Challenges in the IP-based Internet of Things
    Tobias Heer
    Oscar Garcia-Morchon
    René Hummen
    Sye Loong Keoh
    Sandeep S. Kumar
    Klaus Wehrle
    [J]. Wireless Personal Communications, 2011, 61 : 527 - 542
  • [10] Digital Object Architecture as an Approach to Identifying Internet of Things Devices
    Sazonov, Dmitriy
    Kirichek, Ruslan
    [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2019), 2019, 1141 : 597 - 611