Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning

被引:52
作者
Sivanathan, Arunan [1 ]
Gharakheili, Hassan Habibi [1 ]
Sivaraman, Vijay [1 ]
机构
[1] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
关键词
IoT; device monitoring; flow characteristics; machine learning; INTERNET;
D O I
10.1109/TNSM.2020.2971213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors and deployed in large numbers, are growing rapidly. Therefore, management of these devices is becoming increasingly important to network operators. Existing network monitoring technologies perform traffic analysis using specialized acceleration on network switches, or full inspection of packets in software, which can be complex, expensive, inflexible, and unscalable. In this paper, we use SDN paradigm combined with machine learning to leverage the benefits of programmable flow-based telemetry with flexible data-driven models to manage IoT devices based on their network activity. Our contributions are three-fold: (1) We analyze traffic traces of 17 real consumer IoT devices collected in our lab over a six-month period and identify a set of traffic flows (per-device) whose time-series attributes computed at multiple timescales (from a minute to an hour) characterize the network behavior of various IoT device types, and their operating states (i.e., booting, actively interacted with user, or being idle); (2) We develop a multi-stage architecture of inference models that use flow-level attributes to automatically distinguish IoT devices from non-IoTs, classify individual types of IoT devices, and identify their states during normal operations. We train our models and validate their efficacy using real traffic traces; and (3) We quantify the trade-off between performance and cost of our solution, and demonstrate how our monitoring scheme can be used in operation for detecting behavioral changes (firmware upgrade or cyber attacks).
引用
收藏
页码:60 / 74
页数:15
相关论文
共 55 条
[21]   Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers [J].
Das, Aveek K. ;
Pathak, Parth H. ;
Chuah, Chen-Nee ;
Mohapatra, Prasant .
HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2016, :99-104
[22]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[23]   Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks [J].
Farooq, Muhammad Junaid ;
Zhu, Quanyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) :2412-2426
[24]  
Forbes, 2019, U.K. to introduce new law for IoT device security
[25]   iTeleScope: Softwarized Network Middle-Box for Real-Time Video Telemetry and Classification [J].
Gharakheili, Hassan Habibi ;
Lyu, Minzhao ;
Wang, Yu ;
Kumar, Himal ;
Sivaraman, Vijay .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :1071-1085
[26]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[27]  
Hall M.A., 1998, CORRELATION BASED FE
[28]   Combining MUD Policies with SDN for IoT Intrusion Detection [J].
Hamza, Ayyoob ;
Gharakheili, Hassan Habibi ;
Sivaraman, Vijay .
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, :1-7
[29]   Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity [J].
Hamza, Ayyoob ;
Gharakheili, Hassan Habibi ;
Benson, Theophilus A. ;
Sivaraman, Vijay .
SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, :36-48
[30]   Deep Compositional Captioning: Describing Novel Object Categories without Paired Training Data [J].
Hendricks, Lisa Anne ;
Venugopalan, Subhashini ;
Rohrbach, Marcus ;
Mooney, Raymond ;
Saenko, Kate ;
Darrell, Trevor .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :1-10