An enhanced behavioral fingerprinting approach for the Internet of Things

被引:0
作者
Aramini, Alberico [1 ]
Arazzi, Marco [1 ]
Facchinetti, Tullio [1 ]
Ngankem, Laurence S. Q. N. [1 ]
Nocera, Antonino [1 ]
机构
[1] Univ Pavia, Dept Elect Comp & Biomed Engn, Via A Ferrata 5, I-27100 Pavia, Italy
来源
18TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2022 (WFCS 2022) | 2022年
关键词
Internet of Things; Security; Behavioral Finger-printing;
D O I
10.1109/WFCS53837.2022.9779182
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of people daily lives, security concerns have become critical to ensure the exploitation of advantages introduced by this technology. This is even more true in the context of Industry 4.0, for which the IoT is becoming an important driver for automation. The detection of anomalies in IoT systems to ensure the capability of such systems to tolerate attacks to single devices is a crucial aspect. Behavioral fingerprinting is a recent and promising security solution in this context, which still requires research efforts to embrace new challenges in such a complex environment. Existing solutions focus mostly on modeling the behavior of IoT devices by analyzing the information extracted from the header of exchanged networking packets. However, in many application contexts, also attacks on the content of the packets can lead to disruptive results. Our proposal focus on these approaches by addressing a fully distributed scenario in which computation is directly handled by IoT devices, also through delegation, and describes a novel behavioral fingerprinting approach based on features suitably engineered from packet payloads. The effectiveness of our proposed method is assessed by both simulated and experimental results.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 32 条
[1]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[2]  
Ali Jawad, 2019, CEUR WORKSH P, V2486, P244
[3]  
Amouri A, 2018, 2018 IEEE 19TH WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON)
[4]  
Aref MA, 2017, IEEE WCNC
[5]  
Atlam, 2020, DIGITAL TWIN TECHNOL, P123, DOI [DOI 10.1007/978-3-030-18732-3_8, 10.1007/s11948-016-9754-5]
[6]   Intersections between IoT and distributed ledger [J].
Atlam, Hany F. ;
Wills, Gary B. .
ROLE OF BLOCKCHAIN TECHNOLOGY IN IOT APPLICATIONS, 2019, 115 :73-113
[7]  
Bezawada B., 2018, IoTSense: Behavioral fingerprinting of IoT devices
[8]   Behavioral Fingerprinting of IoT Devices [J].
Bezawada, Bruhadeshwar ;
Bachani, Maalvika ;
Peterson, Jordan ;
Shirazi, Hossein ;
Ray, Indrakshi ;
Ray, Indrajit .
PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, :41-50
[9]   Network intrusion detection based on random forest and support vector machine [J].
Chang, Yaping ;
Li, Wei ;
Yang, Zhongming .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, :635-638
[10]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768