A Framework to Protect Iot Devices from Enslavement in a Home Environment

K. Al-Begain, Murad Khan, Basil Alothman, C. Joumaa, Ibrahim Rashed
{"title":"A Framework to Protect Iot Devices from Enslavement in a Home Environment","authors":"K. Al-Begain, Murad Khan, Basil Alothman, C. Joumaa, Ibrahim Rashed","doi":"10.5121/csit.2022.122012","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) mainly consists of devices with limited processing capabilities and memory. Therefore, these devices could be easily infected with malicious code and can be used as botnets. In this regard, we propose a framework to detect and prevent botnet activities in an IoT network. We first describe the working mechanism of how an attacker infects an IoT device and then spreads the infection to the entire network. Secondly, we propose a set of mechanisms consisting of detection, identifying the abnormal traffic generated from IoT devices using filtering and screening mechanisms, and publishing the abnormal traffic patterns to the rest of the home routers on the network. Further, the proposed approach is lightweight and requires fewer computing capabilities for installation on home routers. In the future, we will test the proposed system on real hardware, and the results will be presented to identify the abnormal traffic generated by malicious IoT devices.","PeriodicalId":105776,"journal":{"name":"Signal, Image Processing and Embedded Systems Trends","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Signal, Image Processing and Embedded Systems Trends","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/csit.2022.122012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) mainly consists of devices with limited processing capabilities and memory. Therefore, these devices could be easily infected with malicious code and can be used as botnets. In this regard, we propose a framework to detect and prevent botnet activities in an IoT network. We first describe the working mechanism of how an attacker infects an IoT device and then spreads the infection to the entire network. Secondly, we propose a set of mechanisms consisting of detection, identifying the abnormal traffic generated from IoT devices using filtering and screening mechanisms, and publishing the abnormal traffic patterns to the rest of the home routers on the network. Further, the proposed approach is lightweight and requires fewer computing capabilities for installation on home routers. In the future, we will test the proposed system on real hardware, and the results will be presented to identify the abnormal traffic generated by malicious IoT devices.
保护物联网设备免受家庭环境奴役的框架
物联网(IoT)主要由处理能力和内存有限的设备组成。因此,这些设备很容易被恶意代码感染,可以用作僵尸网络。在这方面,我们提出了一个框架来检测和防止物联网网络中的僵尸网络活动。我们首先描述了攻击者如何感染物联网设备,然后将感染传播到整个网络的工作机制。其次,我们提出了一套机制,包括检测,使用过滤和筛选机制识别物联网设备产生的异常流量,并将异常流量模式发布到网络上的其他家庭路由器。此外,所建议的方法是轻量级的,并且需要较少的计算能力来安装在家庭路由器上。在未来,我们将在真实硬件上测试所提出的系统,并将结果提供给恶意物联网设备产生的异常流量识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信