NFV-based IoT Security for Home Networks using MUD
2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
https://doi.org/10.1109/NOMS47738.2020.9110329Abstract
A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the provider network, combining an NFV (Network Function Virtualization) with router/switching filtering capabilities, e.g., ACLs. The VNF monitors many home networks simultaneously, and therefore, is a highly-scalable managed service solution that provides both the end customers and the ISP with excellent visibility and security of the IoT devices at the customer premises. The system includes a mechanism to distinguish between flows of different devices at the ISP level despite the fact that most home networks (and their IoT devices) are behind a NAT and all the flows from the same home come out with the same source IP address. Moreover, the NFV system needs to receive only the first packet of each connection at the VNF, and rules space is proportional to the number of unique types of IoT devices rather than the number of IoT devices. The monitoring part of the solution is off the critical path and can also uniquely protect from incoming DDoS attacks. To cope with internal traffic, that is not visible outside the customer premise and often consists of P2P communication, we suggest a hybrid approach, where we deploy a lightweight component at the CPE, whose sole purpose is to monitor P2P communication. As current MUD solution does not provide a secure solution to P2P communication, we also extend the MUD protocol to deal also with peer-to-peer communicating devices. A PoC with a large national level ISP proves that our technology works as expected, identifying the various IoT devices that are connected to the network and detecting any unauthorized communications.
References (40)
- T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and A.-R. Sadeghi, "DÏoT: A Federated Self-learning Anomaly Detection System for IoT," in IEEE ICDCS, 2019, pp. 756-767.
- Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, D. Breitenbacher, A. Shabtai, and Y. Elovici, "N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12-22, 2018.
- M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma, "IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT," in IEEE ICDCS, 2017.
- Y. Meidan, M. Bohadana, A. Shabtai, J. D. Guarnizo, M. Ochoa, N. O. Tippenhauer, and Y. Elovici, "ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis ," in ACM/SIGAPP SAC, 2017, pp. 506-509.
- A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wije- nayake, A. Vishwanath, and V. Sivaraman, "Characterizing and classi- fying iot traffic in smart cities and campuses," in 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2017, pp. 559-564.
- R. Doshi, N. Apthorpe, and N. Feamster, "Machine learning DDoS detection for consumer internet of things devices," in IEEE DLS, 2018.
- E. Lear, R. Droms, and D. Romascanu, "RFC 8520: Manufacturer Usage Description Specification," Internet Engineering Task Force, March 2019. [Online]. Available: https://datatracker.ietf.org/doc/rfc8520/
- A. Hamza, D. Ranathunga, H. H. Gharakheili, M. Roughan, and V. Sivaraman, "Clear As MUD: Generating, Validating and Applying IoT Behavioral Profiles," in IoT S&P, 2018.
- McAfee, " McAfee: Built-in Protection for Your Connected Devices," 2019, https://securehomeplatform.mcafee.com/.
- F. Roberts, "Trend micro partners with asus to beef up iot security in homes," Internet of Business, Jan 2017. [Online]. Available: https://internetofbusiness.com/trend-micro-asus-iot-security/
- E. Bertino and N. Islam, "Botnets and internet of things security," Computer, vol. 50, pp. 76-79, 02 2017.
- J. Habibi, D. Midi, A. Mudgerikar, and E. Bertino, "Heimdall: Mitigating the internet of insecure things," IEEE Internet of Things Journal, vol. 4, no. 4, Aug 2017.
- C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and Other Botnets," Computer, vol. 50, no. 7, pp. 80-84, 2017.
- Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats," Journal of Information Processing, vol. 24, no. 3, pp. 522- 533, 2016.
- M. Özçelik, N. Chalabianloo, and G. Gür, "Software-Defined Edge Defense Against IoT-Based DDoS," in IEEE CIT, Aug 2017, pp. 308- 313.
- The Broadband Forum, "TR-069: CPE WAN Management Proto- col," 2018, Issue 1 Amendment 6. URL https://www.broadband- forum.org/download/TR-069_Amendment-6.pdf.
- M. Boucadair, R. Penno, and D. Wing, "RFC 6970: Universal plug and play (UPnP) internet gateway device-port control protocol interworking function (IGD-PCP IWF)," Internet Engineering Task Force, 2013. [Online]. Available: https://tools.ietf.org/html/rfc6970
- J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, "RFC 3489: STUN -Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)," Internet Engineering Task Force, 2003. [Online]. Available: https://tools.ietf.org/html/rfc3489
- B. Ford, P. Srisuresh, and D. Kegel, "Peer-to-peer communication across network address translators." in USENIX Annual Technical Conference, General Track., 2015.
- C. Seaman, "Threat advisory: Mirai botnet," Akamai Threat Advisory, 2016. [Online]. Available: https://www.akamai.com/us/en/multimedia/ documents/stateof-the-internet/akamai-mirai-botnet-threat-advisory.pdf
- "Shadon: The search engine for IoT devices ," https://www.shodan.io/.
- M. Jethanandani, L. Huang, S. Agarwal, and D. Blair, "RFC 8519: Network Access Control List (ACL) YANG Data Model," Internet Engineering Task Force, June 2019. [Online]. Available: https://datatracker.ietf.org/doc/rfc8519/
- L. Su, "MUD is officially approved by IETF as an internet standard, and cisco is launching MUD1.0 to protect your iot devices," Cisco Blogs, May 2019. [Online]. Available: https://blogs.cisco.com/security/ mud-is-officially-approved-by-ietf-as-an-internet-standard-and-cisco- is-launching-mud1-0-to-protect-your-iot-devices
- J. Hong, A. Levy, L. Riliskis, and P. Levis, "Don't talk unless i say so! securing the internet of things with default-off networking," in IEEE/ACM IoTDI, April 2018, pp. 117-128.
- M. Ranganathan, "Soft MUD: Implementing Manufacturer Usage De- scriptions on OpenFlow SDN Switches," in International Conference on Networks (ICN), 2019.
- A. Hamza, H. H. Gharakheili, and V. Sivaraman, "Combining MUD Policies with SDN for IoT Intrusion Detection," in IoT S&P, 2018.
- A. Hamza, H. H. Gharakheili, T. A. Benson, and V. Sivaraman, "Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity," in Proceedings of the 2019 ACM Symposium on SDN Research, ser. SOSR '19. New York, NY, USA: ACM, 2019, pp. 36-48. [Online]. Available: http://doi.acm.org/10.1145/3314148.3314352
- B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, K. Amidon, and M. Casado, "The design and implementation of open vswitch," in NSDI, 2015, pp. 117-130. [Online]. Available: http://www.openvswitch.org/
- Cisco Systems, Inc., Cisco Nexus 1000V Quality of Service Configura- tion Guide, Release 4.0(4)SV1(3). Cisco Systems, Inc., 2016, ch. DSCP and Precedence Values.
- A. Bremler-Barr, H. Levy, and Z. Yakhini, "Iot or not: Identifying iot devices in a shorttime scale (technical report)," https://www.dropbox.com/s/fkznax3dzqlf13l/IoTorNot-report.pdf.
- The Broadband Forum, "TR-098: Internet Gateway Device Data Model for TR-069," 2014, Issue 1 Amendment 2 Corrigendum 1. URL https://www.broadband-forum.org/download/TR-098_Amendment- 2_Corrigendum-1.pdf.
- --, "TR-181: Device Data Model for TR-069," 2011, issue 2 Amendment 2. URL https://www.broadband-forum.org/download/TR- 181_Issue-2_Amendment-2.pdf.
- A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wije- nayake, A. Vishwanath, and V. Sivaraman, "Characterizing and classi- fying IoT traffic in smart cities and campuses," in 2017 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2017, 2017.
- I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," in 4th International Conference on Information Sys- tems Security and Privacy, 2018.
- A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Computers and Security, 2012.
- G. Acar, D. Y. Huang, F. Li, A. Narayanan, and N. Feamster, "Web- based attacks to discover and control local iot devices," in Proceedings of the 2018 Workshop on IoT Security and Privacy. ACM, 2018, pp. 29-35.
- A. Schiffer, "How a fish tank helped hack a casino," 2017. [Online]. Available: https://www.washingtonpost.com/news/innovations/ wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino/?noredirect= on&utm_term=.fb9aad71c166
- Ryu SDN Framework Community, "Ryu SDN Controller," 2017. [Online]. Available: https://osrg.github.io/ryu
- GenieACS Inc, "GenieACS -fast , lightweight TR-069 ACS," 2019. [Online]. Available: https://genieacs.com
- I. Livadariu, K. Benson, A. Elmokashfi, A. Dhamdhere, and A. Dainotti, "Inferring carrier-grade nat deployment in the wild," in IEEE INFOCOM 2018 -IEEE Conference on Computer Communications, April 2018, pp. 2249-2257.