{"title":"Advances in ML-Based Anomaly Detection for the IoT","authors":"Christian Lübben, Marc-Oliver Pahl","doi":"10.1109/CSNet52717.2021.9614280","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614280","url":null,"abstract":"The Internet of Things drives many activities in our modern world. Through its heterogeneity and connectivity to the Internet, it provides an attractive and big attack surface. Anomaly detection is a central tool for making IoT systems more secure. Since 2017, machine learning is successfully used for anomaly detection. This work gives an overview on the evolution of using machine learning for anomaly detection including the most active research groups, and the most attractive venues. In addition, it discusses the advantages and disadvantages of the available methods based on their use in literature.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imran Makhdoom, Kadhim Hayawi, M. Kaosar, S. Mathew, M. Masud
{"title":"Blockchain-based Secure CIDS Operation","authors":"Imran Makhdoom, Kadhim Hayawi, M. Kaosar, S. Mathew, M. Masud","doi":"10.1109/CSNet52717.2021.9614650","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614650","url":null,"abstract":"For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall context, environment, and relevant incidents in other networks. This necessitates a collaborative intrusion detection system that allows multiple intrusion detection systems to communicate with each other and share information on emerging cyber-attack incidents. Thus, immunizing themselves and preventing the attack from escalating. However, the main challenge here is to manage the trust among the peers, where an insider attacker may input false attack signatures to the network, thus degrading the performance. Hence, we propose a blockchain-based trustfree collaborative intrusion detection system, in which threat alert messages will only be propagated in the network after network consensus.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mwrwan Abubakar, Z. Jaroucheh, A. Al-Dubai, W. Buchanan
{"title":"Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems","authors":"Mwrwan Abubakar, Z. Jaroucheh, A. Al-Dubai, W. Buchanan","doi":"10.1109/CSNet52717.2021.9614646","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614646","url":null,"abstract":"The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that it was not designed to be secure by nature as the HTTP digest authentication used in SIP is insecure, making it vulnerable to a variety of attacks. The current solutions rely on several standardised encryption protocols, such as TLS and IPsec, to protect SIP registration messages. However, the current centralised solutions do not scale well and cause algorithm overload when encoding and decoding SIP messages. In trying to rectify this issue, we propose in this paper a blockchain-based lightweight authentication mechanism, which involves a decentralised identity model to authenticate the SIP client to the SIP server. Our mechanism uses a smart contract on the Ethereum blockchain to ensure trust, accountability and preserves user privacy. We provided a proof-of-concept implementation to demonstrate our work. Further analysis of this approach's usability, mainly CPU and memory usage, was conducted comparing to IPsec and TLS. Then we discussed our system's security and presented a security analysis. Our analysis proves that our approach satisfies the SIP protocol security requirements.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124593712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection systems in in-vehicle networks based on bag-of-words","authors":"G. Baldini","doi":"10.1109/CSNet52717.2021.9614644","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614644","url":null,"abstract":"This paper investigates the application of the Bag-of-Words approach for the implementation of Intrusion Detection Systems on CAN-bus traffic in in-vehicle networks. A sliding window approach is used for dimensionality reduction where a set of CAN-bus messages (the window) is transformed to Bag-of-Words statistics. In an initial step, the Bag-of-Words approach is used to create a dictionary on the basis of legitimate CAN-bus traffic without attacks. Then, the Bag-of-Words approach is applied to detect four different types of intrusion attacks. The study presented in this paper investigates the application of Bag-of-Words to different combinations of the data present in the traffic including the arbitration field (CAN-ID) and the payload data. The results of this study confirms the results of the literature, which show that the CAN-ID information provides the optimal detection accuracy. In fact, for some attacks a perfect detection accuracy is obtained (100%). Taking in consideration that the CAN-ID information can be spoofed, the study investigates the use of the payload data as well. The use of payload data decreases the detection accuracy in comparison to the case of using the CAN-ID only, but it still provides an excellent performance (more than 98%) in intrusion detection. Overall, the results of the study show that the Bag-of-Words approach can be applied with success to the detection of various attacks in in-vehicle networks.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127437506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz, António Carvalho, David Campelo
{"title":"Inferring Legacy IoT Device Behavior over a Layer 2 TLS Tunnel","authors":"Rodrigo Caldas, Carlos Novo, Ricardo Morla, Luis Cruz, António Carvalho, David Campelo","doi":"10.1109/CSNet52717.2021.9614643","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614643","url":null,"abstract":"Securing existing legacy device traffic is a necessity when the assumptions used in device security design no longer hold. In this paper we propose a layer 2 tunnel over TLS for legacy device traffic, which is lightweight, generic, and extensible. We then look at one of the threats that the tunnel does not initially address – namely inference attacks on the encrypted tunnel traffic. Inferring device behavior can be an attack by itself as well as a first step for other attacks. Using a legacy commercial, multi-node, embedded system that is aimed at life safety, we show that it is possible to infer legacy device behavior even if the device traffic is encrypted, as is the case with the tunnel. This example shows that simply wrapping legacy traffic with a secure communication protocol does not prevent inference attacks. To illustrate how these attacks can be mitigated, we then introduce padding and dummy traffic on the TLS tunnel, which, as intended, lowers the ability of an eavesdropper to infer legacy device behavior. This is true even if the eavesdropper retrains its model with padding and dummy traffic.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi
{"title":"A secure blockchain-based architecture for the COVID-19 data network","authors":"Darine Al-Mohtar, Amani Ramzi Daou, Nour El Madhoun, Rachad Maallawi","doi":"10.1109/CSNet52717.2021.9614272","DOIUrl":"https://doi.org/10.1109/CSNet52717.2021.9614272","url":null,"abstract":"The COVID-19 pandemic has impacted the world economy and mainly all activities where social distancing cannot be respected. In order to control this pandemic, screening tests such as PCR have become essential. For example, in the case of a trip, the traveler must carry out a PCR test within 72 hours before his departure and if he is not a carrier of the COVID-19, he can therefore travel by presenting, during check-in and boarding, the negative result sheet to the agent. The latter will then verify the presented sheet by trusting: (a) the medical biology laboratory, (b) the credibility of the traveler for not having changed the PCR result from “positive to negative”. Therefore, this confidence and this verification are made without being based on any mechanism of security and integrity, despite the great importance of the PCR test results to control the COVID-19 pandemic. Consequently, we propose in this paper a blockchain-based decentralized trust architecture that aims to guarantee the integrity, immutability and traceability of COVID-19 test results. Our proposal also aims to ensure the interconnection between several organizations (airports, medical laboratories, cinemas, etc.) in order to access COVID-19 test results in a secure and decentralized manner.","PeriodicalId":360654,"journal":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}