Fending off IoT-Hunting Attacks at Home Networks

被引:19
作者
Martin, Vincentius [1 ]
Cao, Qiang [1 ]
Benson, Theophilus [2 ]
机构
[1] Duke Univ, Durham, NC 27706 USA
[2] Brown Univ, Providence, RI 02912 USA
来源
CAN'17: PROCEEDINGS OF THE 2017 CLOUD-ASSISTED NETWORKING WORKSHOP | 2017年
关键词
Home network; IoT; Honeypot; Moving target defense;
D O I
10.1145/3155921.3160640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home network defense, Pot2DPI, and use it to raise an attacker's uncertainty about devices and enable the home network to monitor traffic, detect anomalies, and filter malicious packets. The security offered by Pot2DPI comes from a synthesis of practical techniques: honeypot, deep packet inspection (DPI), and a realization of moving target defense (MTD) in port forwarding. In particular, Pot2DPI has a chain of honeypot and DPI that collects suspicious packet traces, acquires attack signatures, and installs filtering rules at a home router timely. Meanwhile, Pot2DPI shuffles the mapping of ports between the router and the devices connected to it, making a targeted attack difficult and defense more effective. Pot2DPI is our first step towards securing a smart home.
引用
收藏
页码:67 / 72
页数:6
相关论文
共 20 条
[1]  
[Anonymous], 2007, NETWORK INTRUSION DE
[2]  
[Anonymous], 2007, DEV HONEYD VIRTUAL H
[3]  
[Anonymous], 2016, IOT SMART HOME AUTOM
[4]  
[Anonymous], 2007, P 16 USENIX SEC S US
[5]  
[Anonymous], 2015, ACM HOTNETS
[6]  
[Anonymous], 2016, Breaking Down Mirai: An IoT DDoS Botnet Analysis
[7]  
[Anonymous], 2016, DDOS ATTACK DISRUPTE
[8]  
[Anonymous], 2011, REGISTER LINK SAMSUN
[9]  
Davies Nigel, 2016, HOT TOPICS MOBILE CO
[10]  
De la Higuera Colin, 2010, Artificial intelligence techniques