RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT

被引:4
作者
Huertas Celdran, Alberto [1 ]
Sanchez Sanchez, Pedro Miguel [2 ]
von der Assen, Jan [1 ]
Schenk, Timo [1 ]
Bovet, Gerome [3 ]
Martinez Perez, Gregorio [2 ]
Stiller, Burkhard [1 ]
机构
[1] Univ Zurich UZH, Dept Informat IfI, Commun Syst Grp CSG, CH-8050 Zurich, Switzerland
[2] Univ Murcia, Dept Informat & Commun Engn, Murcia 30100, Spain
[3] Cyber Def Campus, Armasuisse Sci & Technol, CH-3602 Thun, Switzerland
关键词
Zero-day attacks mitigation; IoT; reinforcement learning; fingerprinting; MTD selection; STATE;
D O I
10.1109/TIFS.2024.3402055
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for RL, and iii) calculating the consumption of resources in single-board computers (SBC). Thus, the work at hand proposes an online RL-based framework that learns correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. The Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming < 1 MB of storage, $\approx 10$ % of RAM, and negligible CPU.
引用
收藏
页码:5520 / 5529
页数:10
相关论文
共 26 条
[1]   The State of IoT Security: Unequivocal Appeal to Cybercriminals, Onerous to Defenders [J].
Alsheikh, Mohammed ;
Konieczny, Liam ;
Prater, Michael ;
Smith, Gabe ;
Uludag, Suleyman .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (03) :59-68
[2]  
Bellman R.E., 2015, Applied dynamic programming
[3]   Moving target defense: state of the art and characteristics [J].
Cai, Gui-lin ;
Wang, Bao-sheng ;
Hu, Wei ;
Wang, Tian-zuo .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (11) :1122-1153
[4]   Intelligent and behavioral-based detection of malware in IoT spectrum sensors [J].
Celdran, Alberto Huertas ;
Sanchez, Pedro Miguel Sanchez ;
Castillo, Miguel Azorin ;
Bovet, Gerome ;
Perez, Gregorio Martinez ;
Stiller, Burkhard .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (03) :541-561
[5]  
Chai XZ, 2020, 2020 IEEE FIFTH INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE, DSC, P375, DOI 10.1109/DSC50466.2020.00065
[6]   Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [J].
Cho, Jin-Hee ;
Sharma, Dilli P. ;
Alavizadeh, Hooman ;
Yoon, Seunghyun ;
Ben-Asher, Noam ;
Moore, Terrence J. ;
Kim, Dong Seong ;
Lim, Hyuk ;
Nelson, Frederica F. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :709-745
[7]   Reinforcement Learning for Generating Secure Configurations [J].
Dass, Shuvalaxmi ;
Siami Namin, Akbar .
ELECTRONICS, 2021, 10 (19)
[8]   Deep Learning for Zero-day Malware Detection and Classification: A Survey [J].
Deldar, Fatemeh ;
Abadi, Mahdi .
ACM COMPUTING SURVEYS, 2024, 56 (02)
[9]   Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense [J].
Eghtesad, Taha ;
Vorobeychik, Yevgeniy ;
Laszka, Aron .
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2020, 2020, 12513 :58-79
[10]   A review of Machine Learning-based zero-day attack detection: Challenges and future directions [J].
Guo, Yang .
COMPUTER COMMUNICATIONS, 2023, 198 :175-185