Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning

被引:52
作者
Sivanathan, Arunan [1 ]
Gharakheili, Hassan Habibi [1 ]
Sivaraman, Vijay [1 ]
机构
[1] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
关键词
IoT; device monitoring; flow characteristics; machine learning; INTERNET;
D O I
10.1109/TNSM.2020.2971213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors and deployed in large numbers, are growing rapidly. Therefore, management of these devices is becoming increasingly important to network operators. Existing network monitoring technologies perform traffic analysis using specialized acceleration on network switches, or full inspection of packets in software, which can be complex, expensive, inflexible, and unscalable. In this paper, we use SDN paradigm combined with machine learning to leverage the benefits of programmable flow-based telemetry with flexible data-driven models to manage IoT devices based on their network activity. Our contributions are three-fold: (1) We analyze traffic traces of 17 real consumer IoT devices collected in our lab over a six-month period and identify a set of traffic flows (per-device) whose time-series attributes computed at multiple timescales (from a minute to an hour) characterize the network behavior of various IoT device types, and their operating states (i.e., booting, actively interacted with user, or being idle); (2) We develop a multi-stage architecture of inference models that use flow-level attributes to automatically distinguish IoT devices from non-IoTs, classify individual types of IoT devices, and identify their states during normal operations. We train our models and validate their efficacy using real traffic traces; and (3) We quantify the trade-off between performance and cost of our solution, and demonstrate how our monitoring scheme can be used in operation for detecting behavioral changes (firmware upgrade or cyber attacks).
引用
收藏
页码:60 / 74
页数:15
相关论文
共 55 条
[1]  
Ali I., 2019, Internet of things security, device authentication and access control: a review
[2]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[3]  
[Anonymous], INFORMATIONAGE APR
[4]  
[Anonymous], 2020, CYB COMPR DIAGN HUNT
[5]  
[Anonymous], 3431 RFC
[6]  
[Anonymous], 2014, HP STUD REV 70 PERC
[7]  
[Anonymous], 2018, PEEK A BOO I SEE YOU
[8]  
[Anonymous], STAT IOT 2018 NUMB I
[9]  
[Anonymous], 2016, IEEE 1 INT C POWER E
[10]  
[Anonymous], CALL REG IOT SECT