skip to main content
10.1145/3384419.3430414acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
short-paper

Towards identifying IoT traffic anomalies on the home gateway: poster abstract

Published:16 November 2020Publication History

ABSTRACT

The number of IoT devices continues to grow despite the alarming rate of identification of security and privacy issues. There is widespread concern that development of IoT devices is performed without sufficient attention paid to security and privacy issues. Consequently, networks have a higher probability of incorporating vulnerable IoT devices that may be easy to compromise to launch cyber attacks. Inclusion of IoT devices paves the way for a new category of anomalies to be introduced to networks. Traditional anomaly detection techniques (e.g., semi-supervised and signature-based methods), however, are likely inefficient in detecting IoT-based anomalies. This is because these techniques require static signatures of known attacks, specialized hardware, or full packet inspection. They are also expensive, and may be inaccurate or unscalable. Vulnerable IoT devices can be used to perform destructive attacks or invade privacy. The ability to find anomalies in IoT traffic has the potential to assist with early detection and deployment of countermeasures to thwart such attacks. Thus, new techniques for detecting infected IoT devices are needed to mitigate the associated security and privacy risks. In this research, we investigate the possibility to identify IoT traffic using a combination of behavioural profile, predefined blocklist and device fingerprint. Such a system may be able to detect anomalous and/or malicious devices and/or traffic reliably and quickly. Initial results show that for our implementation of such a system, IoT traffic can be identified using device behaviour profile, fingerprint, and contacted destinations. This work takes the first step towards designing and evaluating iDetector, a framework that can detect anomalous behaviour within IoT networks. In our experiments, iDetector was able to correctly identify 80--90% of all captured traffic traversing a home gateway.

References

  1. Ross Anderson. 2008. Security engineering. John Wiley & Sons.Google ScholarGoogle Scholar
  2. Cisco. [n.d.]. Cisco 2018 Annual Cybersecurity Report. Technical Report.Google ScholarGoogle Scholar
  3. Daniel J Dubois, Roman Kolcun, Anna Maria Mandalari, Muhammad Talha Paracha, David Choffnes, and Hamed Haddadi. 2020. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies 2020, 4 (2020), 255--276.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A Benson, and Vijay Sivaraman. 2019. Detecting volumetric attacks on loT devices via SDN-based monitoring of MUD activity. In Proceedings of the 2019 ACM Symposium on SDN Research. 36--48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Danny Yuxing Huang, Noah Apthorpe, Frank Li, Gunes Acar, and Nick Feamster. 2020. Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 2 (2020), 1--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Lear, R. Droms, and D. Romascanu. 2019. Manufacturer Usage Description Specification. RFC 8520 (Proposed Standard). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J Dubois, and David Choffnes. 2020. Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations. IEEE Security and Privacy Workshops on Technology and Consumer Protection (2020).Google ScholarGoogle Scholar
  8. Jingjing Ren, Daniel J. Dubois, David Choffnes, Anna Maria Mandalari, Roman Kolcun, and Hamed Haddadi. 2019. Information Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. In Proc. of the Internet Measurement Conference (IMC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Andrew Tannenbaum. [n.d.]. Why Do IoT Companies Keep Building Devices with Huge Security Flaws? https://hbr.org/2017/04/why-do-iot-companies-keep-building-devices-with-huge-security-flawsGoogle ScholarGoogle Scholar

Index Terms

  1. Towards identifying IoT traffic anomalies on the home gateway: poster abstract

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor Systems
          November 2020
          852 pages
          ISBN:9781450375900
          DOI:10.1145/3384419

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 November 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate174of867submissions,20%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader