Identifying attack signatures for the Internet of Things An IP flow based approach

被引:0
|
作者
Vieira, Leandro [1 ,2 ]
Santos, Leonel [1 ,2 ,3 ]
Goncalves, Ramiro [3 ,4 ]
Rabadao, Carlos [1 ,2 ]
机构
[1] Polytech Inst Leiria, Sch Technol & Management, Leiria, Portugal
[2] Polytech Inst Leiria, Comp Sci & Commun Res Ctr CIIC, Leiria, Portugal
[3] Univ Tras Os Montes & Alto Douro, Vila Real, Portugal
[4] INESC TEC, Porto, Portugal
关键词
Security; network attacks; flow monitoring; network intrusion detection; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Hackers Conduct First Internet of Things Attack
    Garber, Lee
    [J]. COMPUTER, 2014, 47 (03) : 18 - 19
  • [42] A DDoS Attack Mitigation Framework for Internet of Things
    Adat, Vipindev
    Gupta, B. B.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2036 - 2041
  • [43] An Attack-Resilient Architecture for the Internet of Things
    Almohri, Hussain M. J.
    Watson, Layne T.
    Evans, David
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (3940-3954) : 3940 - 3954
  • [44] Internet of Things & Cloud Computing Internet of Things as a Service Approach
    Othman, Maison M.
    El-Mousa, Ali
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 318 - 323
  • [45] Sybil Attack Detection in Internet of Flying Things-IoFT: A Machine Learning Approach
    Chulerttiyawong, Donpiti
    Jamalipour, Abbas
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12854 - 12866
  • [46] Differential Game Approach for Attack-Defense Strategy Analysis in Internet of Things Networks
    Wu, Huici
    Gao, Qiuyue
    Tao, Xiaofeng
    Zhang, Ning
    Chen, Dajiang
    Han, Zhu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 10340 - 10353
  • [47] An IP-based Arrangement to Connect Wireless Sensor Networks to the Internet of Things
    Gadallah, Yasser
    Elalamy, Ehab
    elTager, Mostafa
    [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2745 - 2750
  • [48] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [49] Slimfit - A HIP DEX Compression Layer for the IP-based Internet of Things
    Hummen, Rene
    Hiller, Jens
    Henze, Martin
    Wehrle, Klaus
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 259 - 266
  • [50] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    [J]. 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,