Academia.eduAcademia.edu

Outline

Anomaly Behavior Analysis for IoT Network Nodes

2019, ACM International Conference Proceeding Series. 3rd International Conference on Future Networks and Distributed Systems,

https://doi.org/10.1145/3341325.3342008

Abstract

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities. The integration of IoT with Fog and Cloud Computing can bring not only the computational requirements, but they also enable IoT services to be pervasive, cost-effective, and can be accessed from anywhere and at any time. In any IoT application, communications are crucial to deliver the required information, for instance to take actions during crisis events. However, IoT components such as Gateways, usually referred as IoT nodes, will introduce major security challenges as they contribute to increase the attack surface, preventing the IoT to deliver accurate information to final users. In this paper, we present a methodology to develop an Intrusion Detection System based on Anomaly Behavior Analysis to detect when an IoT network node is being compromised. Our preliminary experimental results show that our approach accurately detects known and unknown anomalies due to misuses or cyber-attacks, with high detection rate and low false alarms.

References (31)

  1. M. Al-Bahri, A. Yankovsky, A. Borodin, R. Kirichek, R. 2018. Testbed for Identify IoT-Devices Based on Digital Object Architecture. In Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y., Eds.; Springer International Publishing, 2018; pp. 129-137.
  2. A. Zanella, N. Bui, A. Castellani, L. Vangelista, M. Zorzi. 2014. Internet of Things for Smart Cities. IEEE Internet of Things Journal 2014, 1, 22-32.
  3. D. Kushner. 2013. The real story of stuxnet. IEEE Spectrum 2013, 50, 48-53.
  4. J. Pacheco, S. Hariri. 2016. IoT Security Framework for Smart Cyber Infrastructures. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 242- 247.
  5. J.L. Pérez, A. Gutierrez-Torre, J.L. Berral, D. Carrera. 2018. A resilient and distributed near real-time traffic forecasting application for Fog computing environments. Future Generation Computer Systems 2018, 87, 198-212.
  6. A.S. Sohal, R. Sandhu, S.K. Sood, V. Chang. 2018. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security 2018, 74, 340-354.
  7. J. Pacheco, S. Hariri. 2018. Anomaly behavior analysis for IoT sensors. Transactions on Emerging Telecommunications Technologies 2018, 29, e3188.
  8. G. Orsini, D. Bade, W. Lamersdorf. 2016. CloudAware: A Context-Adaptive Middleware for Mobile Edge and Cloud Computing Applications. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 216-221.
  9. A. Hegyi, H. Flinck, I. Ketyko, P. Kuure, C. Nemes, L. Pinter. 2016. Application Orchestration in Mobile Edge Cloud: Placing of IoT Applications to the Edge. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); IEEE: Augsburg, Germany, 2016; pp. 230-235.
  10. F. Bonomi, R.A. Milito, J. Zhu, S. Addepalli. Fog computing and its role in the internet of things. In Proceedings of the MCC@SIGCOMM; 2012.
  11. C.A. Garcia-Perez, P. Merino. Enabling Low Latency Services on LTE Networks. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 248-255.
  12. J. Xu, K. Ota, M. Dong, A. Liu, Q. Li. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf Technol Electronic Eng 2018, 19, 1546-1557.
  13. Q. Yaseen, F. AlBalas, Y. Jararweh, M. Al-Ayyoub. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W); 2016; pp. 256-262.
  14. M. Conti, A. Dehghantanha, K. Franke, S. Watson. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018, 78, 544-546.
  15. M. Ammar, G. Russello, B. Crispo. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 2018, 38, 8-27.
  16. S. Ali, T. Al Balushi, Z. Nadir, O.K. Hussain. Risk Management for CPS Security. In Cyber Security for Cyber Physical Systems; Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K., Eds.; Studies in Computational Intelligence; Springer International Publishing: Cham, 2018; pp. 11-33 ISBN 978-3-319- 75880-0.
  17. O. Can, O.K. Sahingoz. A survey of intrusion detection systems in wireless sensor networks. In Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO); 2015; pp. 1-6.
  18. S. Fayssal, S. Hariri, Y. Al-Nashif. Anomaly-Based Behavior Analysis of Wireless Network Security. In Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking Services (MobiQuitous); 2007; pp. 1-8.
  19. E. Hodo, X. Bellekens, A. Hamilton, P. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC); 2016; pp. 1-6.
  20. R. Schlegel, S. Obermeier, J. Schneider. Structured system threat modeling and mitigation analysis for industrial automation systems. In Proceedings of the 2015 IEEE 13th International Conference on Industrial Informatics (INDIN); 2015; pp. 197-203.
  21. H. Tran-Dang, D. Kim. An Information Framework for Internet of Things Services in Physical Internet. IEEE Access 2018, 6, 43967-43977.
  22. J. Guth, U. Breitenbücher, M. Falkenthal, F. Leymann, L. Reinfurt. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT); 2016; pp. 1-6.
  23. V.V. Gadde, H. Awano, Ikeda, M. An Encryption-Authentication Unified A/D Conversion Scheme for IoT Sensor Nodes. In Proceedings of the 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC); 2018; pp. 123-126.
  24. B. Daddala, H. Wang, A.Y. Javaid. Design and implementation of a customized encryption algorithm for authentication and secure communication between devices. In Proceedings of the 2017 IEEE National Aerospace and Electronics Conference (NAECON); 2017; pp. 258-262.
  25. J. Pacheco, C. Tunc, S. Hariri. Design and evaluation of resilient infrastructures systems for smart cities. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2); 2016; pp. 1-6.
  26. J. Pacheco, D. Ibarra, A. Vijay, S. Hariri. IoT Security Framework for Smart Water System. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA); 2017; pp. 1285-1292.
  27. Y. Mahmoodi, S. Reiter, Viehl, O. Bringmann, W. Rosenstiel. Attack Surface Modeling and Assessment for Penetration Testing of IoT System Designs. In Proceedings of the 2018 21st Euromicro Conference on Digital System Design (DSD); 2018; pp. 177-181.
  28. L. Welling, L. Thomson. PHP and MySQL Web development. Sams Publishing, 2003.
  29. Weka (consulted on March 25th 2019), retrieved form: http://weka.sourceforge.net/doc.dev/weka/classifiers/rules/JRip.html.
  30. I. Witten, E. Frank, M. Hall. Data Mining: Practical Machine Learning Tools and Techniques. 3rd Edition. Morgan Kaufmann Publishers (ISBN: 978-0-12- 374856-0), 2011
  31. H. Chauhan, V. Kumar, S. Pundir, S. Pilli. A Comparative Study of Classification Techniques for Intrusion Detection. IEEE International Symposium on Computational and Business Intelligence, New Delhi, India, 2013.