A Host-based Intrusion Detection and Mitigation Framework for Smart Home IoT using OpenFlow

被引:134
作者
Nobakht, Mehdi [1 ,2 ]
Sivaraman, Vijay [2 ]
Boreli, Roksana [3 ]
机构
[1] CSIRO, Data61, Canberra, ACT, Australia
[2] Univ New South Wales, Syndey, Australia
[3] Natl ICT Australia, Syndey, Australia
来源
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016) | 2016年
关键词
Internet of Things (IoT); Smart-home; SDN; Open-Flow; Machine learning; Anomaly detection; Attack mitigation; INTERNET; SECURITY; PRIVACY; THINGS;
D O I
10.1109/ARES.2016.64
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart devices are gaining popularity in our homes with the promise to make our lives easier and more comfortable. However, the increased deployment of such smart devices brings an increase in potential security risks. In this work, we propose an intrusion detection and mitigation framework, called IoT-IDM, to provide a network-level protection for smart devices deployed in home environments. IoT-IDM monitors the network activities of intended smart devices within the home and investigates whether there is any suspicious or malicious activity. Once an intrusion is detected, it is also capable of blocking the intruder in accessing the victim device on the fly. The modular design of IoT-IDM gives its users the flexibility to employ customized machine learning techniques for detection based on learned signature patterns of known attacks. Software-defined networking technology and its enabling communication protocol, OpenFlow, are used to realise this framework. Finally, a prototype of IoT-IDM is developed and the applicability and efficiency of proposed framework demonstrated through a real IoT device: a smart light bulb.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 24 条
[1]  
[Anonymous], 2012, CISC VIS NETW IND GL
[2]  
[Anonymous], 2015, BBC
[3]  
[Anonymous], 2011, White Paper
[4]  
[Anonymous], 2015, CISC VIS NETW IND GL
[5]  
[Anonymous], 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2512494, DOI 10.1145/2508859.2512494]
[6]  
[Anonymous], 2013, HACKING LIGHTBULBS
[7]  
[Anonymous], 2009, P HOTN
[8]  
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[9]  
Braga R, 2010, C LOCAL COMPUT NETW, P408, DOI 10.1109/LCN.2010.5735752
[10]  
Das S. R., 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011), P141, DOI 10.1109/PERCOMW.2011.5766856