Edge-Based Intrusion Detection for IoT devices

被引:15
作者
Mudgerikar, Anand [1 ]
Sharma, Puneet [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, CS Dept, 305 N Univ St, W Lafayette, IN 47907 USA
[2] Hewlett Packard Labs, 940 N McCathy Blvd, Milpitas, CA 95035 USA
关键词
Intrusion detection; IoT security; malware; edge; AI; INTERNET;
D O I
10.1145/3382159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) is estimated to grow to 25 billion by 2021, there is a need for an effective and efficient Intrusion Detection System (IDS) for IoT devices. Traditional network-based IDSs are unable to efficiently detect IoT malware and new evolving forms of attacks like file-less attacks. In this article, we present a system level Device-Edge split IDS for IoT devices. Our IDS profiles IoT devices according to their "behavior" using system-level information like running process parameters and their system calls in an autonomous, efficient, and scalable manner and then detects anomalous behavior indicative of intrusions. The modular design of our IDS along with a unique device-edge split architecture allows for effective attack detection with minimal overhead on the IoT devices. We have extensively evaluated our system using a dataset of 3,973 traditional IoT malware samples and 8 types of sophisticated file-less attacks recently observed against IoT devices in our testbed. We report the evaluation results in terms of detection efficiency and computational.
引用
收藏
页数:21
相关论文
共 39 条
[1]   Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources [J].
Al-Haidari, F. ;
Sqalli, M. ;
Salah, K. .
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, :256-261
[2]  
[Anonymous], 2016, NDSS
[3]  
[Anonymous], 2005, USENIX ANN TECHN C F
[4]  
[Anonymous], 2016, NDSS
[5]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[6]  
Bertino E., 2016, EDBT VOL, P1
[7]  
Bonomi F., 2012, P 1 EDITION MCC WORK, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[8]   VDC-Analyst: Design and verification of virtual desktop cloud resource allocations [J].
Calyam, Prasad ;
Rajagopalan, Sudharsan ;
Seetharam, Sripriya ;
Selvadhurai, Arunprasath ;
Salah, Khaled ;
Ramnath, Rajiv .
COMPUTER NETWORKS, 2014, 68 :110-122
[9]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[10]  
Chavez Timothy R., 2006, LINUXWORLD C EXP BOS