Reactive and Proactive Threat Detection and Prevention for the Internet of Things

Matthew Hagan, S. Sezer, K. Mclaughlin
{"title":"Reactive and Proactive Threat Detection and Prevention for the Internet of Things","authors":"Matthew Hagan, S. Sezer, K. Mclaughlin","doi":"10.1109/SOCC46988.2019.1570574214","DOIUrl":null,"url":null,"abstract":"The Internet of Things presents significant potential benefits to society. However, so too exists a multitude of threats, both those adapted from IT systems and newly created attacks that exploit devices, infrastructure, services and their users.This thesis contributes towards the security of the IoT from a device perspective. The first contribution is a new method for analysing network traffic behaviours. By enhancing profiling methods, a novel, real-time approach has been applied to detect complex network events, including threats that can evade detection by means such as regular expression. The second contribution explores a use case-based modelling that allows the specification of technical policies, from the security model, that enforce the intended functionality of the device. When implemented, such an approach can ensure that the system operates only as intended, regardless of security issues that may arise later. Finally, an enforcement mechanism is proposed at system bus level that can infer malicious activity and mitigate its effects. This approach has advantages over existing softwarebased solutions, in that it is implemented as a physically isolated hardware block. Each of the contributions is evaluated within a proposed connected car implementation, demonstrating the applicability of the research undertaken, within the IoT.","PeriodicalId":253998,"journal":{"name":"2019 32nd IEEE International System-on-Chip Conference (SOCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 32nd IEEE International System-on-Chip Conference (SOCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCC46988.2019.1570574214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The Internet of Things presents significant potential benefits to society. However, so too exists a multitude of threats, both those adapted from IT systems and newly created attacks that exploit devices, infrastructure, services and their users.This thesis contributes towards the security of the IoT from a device perspective. The first contribution is a new method for analysing network traffic behaviours. By enhancing profiling methods, a novel, real-time approach has been applied to detect complex network events, including threats that can evade detection by means such as regular expression. The second contribution explores a use case-based modelling that allows the specification of technical policies, from the security model, that enforce the intended functionality of the device. When implemented, such an approach can ensure that the system operates only as intended, regardless of security issues that may arise later. Finally, an enforcement mechanism is proposed at system bus level that can infer malicious activity and mitigate its effects. This approach has advantages over existing softwarebased solutions, in that it is implemented as a physically isolated hardware block. Each of the contributions is evaluated within a proposed connected car implementation, demonstrating the applicability of the research undertaken, within the IoT.
物联网的被动和主动威胁检测和预防
物联网为社会带来了巨大的潜在利益。然而,也存在着大量的威胁,既有来自IT系统的威胁,也有利用设备、基础设施、服务及其用户的新创建的攻击。本文从设备的角度对物联网的安全性做出了贡献。第一个贡献是分析网络流量行为的新方法。通过增强分析方法,一种新的、实时的方法被应用于检测复杂的网络事件,包括可以通过正则表达式等手段逃避检测的威胁。第二个贡献探讨了基于用例的建模,该建模允许从安全模型中指定技术策略,以强制设备的预期功能。当实现时,这样的方法可以确保系统只按预期运行,而不考虑以后可能出现的安全问题。最后,提出了一种系统总线级的强制机制,可以推断恶意活动并减轻其影响。与现有的基于软件的解决方案相比,这种方法具有优势,因为它是作为物理隔离的硬件块实现的。每一项贡献都将在拟议的联网汽车实施中进行评估,以证明所进行研究在物联网中的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信