IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks

被引:0
作者
Alam, Md Morshed [1 ]
Jahan, Israt [2 ]
Wang, Weichao [1 ]
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
[2] Univ Memphis, Dept Comp Sci, Memphis, TN USA
来源
2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024 | 2024年
关键词
Internet of Things; Remote Injection Attack; Deep Reinforcement Learning; Markov Decision Process; Trigger-action Platform; Deep Q-Network;
D O I
10.1109/WCNC57260.2024.10570786
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their cyber states and let the hubs invoke actions in other IoT devices based on functional dependencies defined as rules in a rule engine. These functional dependencies create a chain of interactions that help automate network tasks. Adversaries exploit this chain to report fake event conditions to IoT hubs and perform remote injection attacks upon a smart environment to indirectly control target IoT devices. Existing defense efforts usually depend on static analysis over IoT apps to develop rule-based anomaly detection mechanisms. We also see ML-based defense mechanisms in the literature that harness physical event fingerprints to determine anomalies in an IoT network. However, these methods often demonstrate long response time and lack of adaptability when facing complicated attacks. In this paper, we propose to build a deep reinforcement learning based real-time defense system for injection attacks. We define the reward functions for defenders and implement a deep Q-network based approach to identify the optimal defense policy. Our experiments show that the proposed mechanism can effectively and accurately identify and defend against injection attacks with reasonable computation overhead.
引用
收藏
页数:6
相关论文
共 23 条
  • [1] IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
    Alam, Md Morshed
    Sajid, Md Sajidul Islam
    Wang, Weichao
    Wei, Jinpeng
    [J]. 2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1695 - 1700
  • [2] A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
    Alam, Md Morshed
    Wang, Weichao
    [J]. JOURNAL OF COMPUTER SECURITY, 2021, 29 (04) : 423 - 446
  • [3] Ammann P., 2002, P 9 ACM C COMPUTER C, P217, DOI DOI 10.1145/586110.586140
  • [4] Babun L., 2018, ARXIV
  • [5] A MARKOVIAN DECISION PROCESS
    BELLMAN, R
    [J]. JOURNAL OF MATHEMATICS AND MECHANICS, 1957, 6 (05): : 679 - 684
  • [6] PEEVES: Physical Event Verification in Smart Homes
    Birnbach, Simon
    Eberz, Simon
    Martinovic, Ivan
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1455 - 1467
  • [7] Brockman G., 2016, OPENAI GYM
  • [8] Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
    Celik, Z. Berkay
    Fernandes, Earlence
    Pauley, Eric
    Tan, Gang
    Mcdaniel, Patrick
    [J]. ACM COMPUTING SURVEYS, 2019, 52 (04)
  • [9] IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
    Celik, Z. Berkay
    Tan, Gang
    McDaniel, Patrick
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [10] Metastatic Seminoma with Positive Staining of Cytokeratin and MOC31: A Diagnostic Pitfall
    Fan, Jiaming
    Yuan, Ren
    Stefanelli, David
    Wang, Gang
    [J]. CASE REPORTS IN PATHOLOGY, 2021, 2021