A security monitoring system for internet of things

被引:21
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Riccio, Antonio [1 ]
Rivera, Diego [2 ]
Mallouli, Wissam [2 ]
de Oca, Edgardo Montes [2 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
[2] Montimage R&D, Paris, France
关键词
IoT monitoring; IoT security; IoT threats;
D O I
10.1016/j.iot.2019.100080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of the Internet of Things (IoT) paradigm in several application domains has raised new security issues, which should be carefully taken into account to achieve a real benefit from the indisputable innovation potential of IoT. In fact, the heterogeneity of involved technologies, including the integration of different resource-constrained devices and networks, has led to the introduction of new threats affecting all architectural layers and urging for the design and enforcement of adequate security countermeasures, including effective monitoring capabilities. In this paper, we present a monitoring tool for IoT systems based on the extension of the Montimage network monitoring tools. The proposed solution, validated within the H2020 ANASTACIA project, proved to be well suited to monitor IoT-level networks thanks to the exploitation of protocol-specific plugins. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:20
相关论文
共 30 条
[1]  
[Anonymous], 2015, IEEE STANDARD LOW RA
[2]  
[Anonymous], 2017, 2017 GLOBAL INTERNET, DOI DOI 10.1109/GIOTS.2017.8016285
[3]   Internet of Things as a Methodological Concept [J].
Bari, Nima ;
Mani, Ganapathy ;
Berkovich, Simon .
2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING FOR GEOSPATIAL RESEARCH AND APPLICATION (COM.GEO), 2013, :48-55
[4]   Toward the automation of threat modeling and risk assessment in IoT systems [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano ;
Villano, Umberto .
INTERNET OF THINGS, 2019, 7
[5]   Security Monitoring in the Cloud: an SLA-based approach [J].
Casola, Valentina ;
De Benedictis, Alessandra ;
Rak, Massimiliano .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :749-755
[6]  
Cerullo G., 2018, Dans Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, P77, DOI DOI 10.1016/13978-0-12-811373-8.00004-5
[7]  
Coppolino Luigi, 2013, Critical Information Infrastructures Security. 7th International Workshop, CRITIS 2012. Revised Selected Papers: LNCS 7722, P10, DOI 10.1007/978-3-642-41485-5_2
[8]   Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks [J].
Coppolino, Luigi ;
D'Antonio, Salvatore ;
Garofalo, Alessia ;
Romano, Luigi .
2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, :247-254
[9]  
Hui J., 2011, RFC 6282 (Proposed Standard), DOI [10.17487/RFC6282, DOI 10.17487/RFC6282]
[10]  
Kirby O., 2007, IEEE 802 15 4 DISSEC