KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security

被引:8
作者
Li, Dong [1 ]
Zhang, Zhaonian [2 ]
Liao, Weiyuan [2 ]
Xu, Zhiwei [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Univ Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
来源
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC) | 2018年
关键词
iot operating system; kernel level; resource auditor; security;
D O I
10.1109/SEC.2018.00058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the rapid development of the Internet of Things facilitates human life and work, while it also brings great security risks to the society due to the frequent occurrence of various security issues. IoT device has the characteristics of large-scale deployment and single responsibility application, which makes it easy to cause a chain reaction and results in widespread privacy leakage and system security problems when the software vulnerability is identified. It is difficult to guarantee that there is no security hole in the IoT operating system which is usually designed for MCU and has no kernel mode. An alternative solution is to identify the security issues in the first time when the system is hijacked and suspend the suspicious task before it causes irreparable damage. This paper proposes KLRA (A Kernel Level Resource Auditing Tool) for IoT Operating System Security This tool collects the resource-sensitive events in the kernel and audit the the resource consumption pattern of the system at the same time. KLRA can take fine-grained events measure with low cost and report the relevant security warning in the first time when the behavior of the system is abnormal compared with daily operations for the real responsibility of this device. KLRA enables the IoT operating system for MCU to generate the security early warning and thereby provides a self-adaptive heuristic security mechanism for the entire IoT system.
引用
收藏
页码:427 / 432
页数:6
相关论文
共 15 条
[1]  
[Anonymous], Title of paper if known
[2]  
[Anonymous], 2017, INT C WEB INT WORKSH
[3]   MANTIS OS: An embedded multithreaded operating system for wireless micro sensor platforms [J].
Bhatti, S ;
Carlson, J ;
Dai, H ;
Deng, J ;
Rose, J ;
Sheth, A ;
Shucker, B ;
Gruenwald, C ;
Torgerson, A ;
Han, R .
MOBILE NETWORKS & APPLICATIONS, 2005, 10 (04) :563-579
[4]   Attacks and Defenses in the Data Plane of Networks [J].
Chasaki, Danai ;
Wolf, Tilman .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) :798-810
[5]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[6]  
Eswaran A, 2005, P 26 IEEE INT REAL T, V10, P265
[7]  
Gebai M, 2018, ACM COMPUT SURV, V51, P1
[8]   Ransomware behavioural analysis on windows platforms [J].
Hampton, Nikolai ;
Baig, Zubair ;
Zeadally, Sherali .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 :44-51
[9]  
Han C C, 2005, SOS DYNAMIC OPERATIN
[10]   Dynamic Hardware Monitors for Network Processor Protection [J].
Hu, Kekai ;
Chandrikakutty, Harikrishnan Kumarapillai ;
Goodman, Zachary ;
Tessier, Russell ;
Wolf, Tilman .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (03) :860-872