{"title":"用于智能家居的基于snort的安全边缘路由器","authors":"N.D. Patel, B.M. Mehtre, Rajeev Wankar","doi":"10.1504/ijsnet.2023.128505","DOIUrl":null,"url":null,"abstract":"Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely. There is a need for a cost-effective, secure router for a smart home. This paper investigates and proposes a Snort-based secure edge router for smart home (SERfSH), which is resilient to many cyberattacks. SERfSH automatically generates Snort content rules by combining the extracted string, location information, header information, and sequential pattern. The experimental setup of SERfSH consists of a Raspberry Pi 4 model, an ESP32 microcontroller, six IoT devices, and a malicious actor machine. The proposed SERfSH is tested for 15 attacks, and the results show that 14 attacks were detected and 12 attacks were mitigated.","PeriodicalId":49177,"journal":{"name":"International Journal of Sensor Networks","volume":"17 1","pages":"0"},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Snort-based secure edge router for smart home\",\"authors\":\"N.D. Patel, B.M. Mehtre, Rajeev Wankar\",\"doi\":\"10.1504/ijsnet.2023.128505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely. There is a need for a cost-effective, secure router for a smart home. This paper investigates and proposes a Snort-based secure edge router for smart home (SERfSH), which is resilient to many cyberattacks. SERfSH automatically generates Snort content rules by combining the extracted string, location information, header information, and sequential pattern. The experimental setup of SERfSH consists of a Raspberry Pi 4 model, an ESP32 microcontroller, six IoT devices, and a malicious actor machine. The proposed SERfSH is tested for 15 attacks, and the results show that 14 attacks were detected and 12 attacks were mitigated.\",\"PeriodicalId\":49177,\"journal\":{\"name\":\"International Journal of Sensor Networks\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijsnet.2023.128505\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijsnet.2023.128505","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Cybercrimes are rising rapidly with the increasing use of the internet of things (IoT)-based gadgets at home. For instance, the Mirai-BotNet infected and compromised many IoT-based devices and routers, creating a zombie network of robots that can be controlled remotely. There is a need for a cost-effective, secure router for a smart home. This paper investigates and proposes a Snort-based secure edge router for smart home (SERfSH), which is resilient to many cyberattacks. SERfSH automatically generates Snort content rules by combining the extracted string, location information, header information, and sequential pattern. The experimental setup of SERfSH consists of a Raspberry Pi 4 model, an ESP32 microcontroller, six IoT devices, and a malicious actor machine. The proposed SERfSH is tested for 15 attacks, and the results show that 14 attacks were detected and 12 attacks were mitigated.
期刊介绍:
IJSNet proposes and fosters discussion on and dissemination of issues related to research and applications of distributed and wireless/wired sensor and actuator networks. Sensor networks is an interdisciplinary field including many fields such as wireless networks and communications, protocols, distributed algorithms, signal processing, embedded systems, and information management.
Topics covered include:
-Energy efficiency, energy efficient protocols-
Applications-
Location techniques, routing, medium access control-
Coverage, connectivity, longevity, scheduling, synchronisation-
Network resource management, network protocols, lightweight protocols-
Fault tolerance/diagnostics-
Foundations-
Data storage, query processing, system architectures, operating systems-
In-network processing and aggregation-
Learning of models from data-
Mobility-
Performance analysis-
Sensor tasking and control-
Security, privacy, data integrity-
Modelling of systems/physical environments, simulation tools/environments.