A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets

被引:6
作者
Cruz, Bruno [1 ]
Gomez-Meire, Silvana [1 ]
Ruano-Ordas, David [1 ,2 ,3 ,4 ]
Janicke, Helge [3 ,4 ]
Yevseyeva, Iryna [3 ,4 ]
Mendez, Jose R. [1 ,2 ]
机构
[1] Univ Vigo, Dept Comp Sci, ESEI Escuela Super Ingn Informat, Edificio Politecn,Campus Univ As Lagoas S-N, Orense 32004, Spain
[2] SERGAS UVIGO, Galicia Hlth Res Inst IIS Galicia Sur, SING Res Grp, Vigo, Spain
[3] De Montfort Univ, Sch Comp Sci & Informat, Cyber Technol Inst, Gateway House 5-33, Leicester LE1 9BH, Leics, England
[4] De Montfort Univ, Fac Comp Engn & Media CEM, Leicester, Leics, England
关键词
INTERNET; THINGS; TRUST; WORMS; TOOLS; MODEL;
D O I
10.1155/2019/9067512
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices. This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support. Many manufacturers quickly created hundreds of devices implementing functionalities but neglected some critical issues pertaining to device security. This oversight gave rise to the current situation where thousands of devices remain unpatched having many security issues that manufacturers cannot address after the devices have been produced and deployed. This article presents our novel research protecting IOT devices using Berkeley Packet Filters (BPFs) and evaluates our findings with the aid of our Filter.tlk tool, which is able to facilitate the development of BPF expressions that can be executed by GNU/Linux systems with a low impact on network packet throughput.
引用
收藏
页数:11
相关论文
共 72 条
[1]   A comprehensive survey on internet outages [J].
Aceto, Giuseppe ;
Botta, Alessio ;
Marchetta, Pietro ;
Persico, Valerio ;
Pescape, Antonio .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 113 :36-63
[2]  
Alemayhu A., 2018, MOVING IPTABLES NFTA
[3]   Hybrid Trust Model for Worm Mitigation in P2P Networks [J].
Amine Rguibi, Mohamed ;
Moussa, Najem .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 :21-36
[4]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[5]  
Anand P., 2017, INTRO USING EBPF FIL
[6]  
[Anonymous], 2016, Wireshark
[7]  
[Anonymous], 2018, Raspberry Pi
[8]   Deep packet inspection tools and techniques in commodity platforms: Challenges and trends [J].
Antonello, Rafael ;
Fernandes, Stenio ;
Kamienski, Carlos ;
Sadok, Djamel ;
Kelner, Judith ;
Godor, Istvan ;
Szabo, Geza ;
Westholm, Tord .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) :1863-1878
[9]  
Apache Software Foundation, 2018, AP HTTP SERV BENCHM
[10]  
Bertasius Gedas, 2017, P ROBOTICS SCI SYSTE, P5