Proceedings of the 2019 ACM Symposium on SDN Research 2019
DOI: 10.1145/3314148.3314352
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity

Abstract: Smart homes, enterprises, and cities equipped with IoT devices are increasingly becoming target of an escalating number of sophisticated new cyber-attacks. Anomaly-based detection methods are promising in finding new attacks, but there are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively. The IETF recent standard called Manufacturer Usage Description (MUD) seems promising to limit the attack surface on IoT devices by formally specifying their int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
104
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(104 citation statements)
references
References 34 publications
0
104
0
Order By: Relevance
“…The use of MUD as an isolation-based defensive mechanism to restrict traic generated from IoT devices is still in its early phase. Therefore, only a few deployment scenarios and proof-of-concept (PoC) implementations currently exist [1,2,10,11,19,28]. To the best of our knowledge, no work has considered the deployment of FL in MUD-compliant networks.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of MUD as an isolation-based defensive mechanism to restrict traic generated from IoT devices is still in its early phase. Therefore, only a few deployment scenarios and proof-of-concept (PoC) implementations currently exist [1,2,10,11,19,28]. To the best of our knowledge, no work has considered the deployment of FL in MUD-compliant networks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…To reduce the attack surface in IoT, the Internet Engineering Task Force (IETF) has ratiied a standard for IoT device manufacturers to provide a Manufacturer Usage Description (MUD) with their IoT devices [14]. The MUD standard restricts and limits traic end-points and rates in and out of IoT devices, thus limiting the attack surface and enabling identiication of volumetric and man-in-the-middle attacks [11,27]. Deployment of FL in MUD-compliant networks thus not only meets necessary security requirements but also provides a practical solution for limiting the attack surface.…”
Section: Introductionmentioning
confidence: 99%
“…These rules are proactively configured into network switches and used to detect attacks by using an Intrusion Detection System (IDS). The same authors use an SDN-based approach to monitor the compliance of a device's behavior with the corresponding MUD profile [24]. Toward this end, they develop an anomaly detection mechanism to identify potential attacks, such as DoS and Address Resolution Protocol (ARP) spoofing.…”
Section: Related Workmentioning
confidence: 99%
“…MUD standard has attracted the attention of different Standards Developing Organization (SDOs), such as the National Institute Standards and Technology (NIST) in U.S. [3,4] that has proposed the creation of a vulnerability behavior database based on this standard (https://www.nist.gov/itl/applied-cybersecurity/nist-initiatives-iot). One of the strong points of the MUD standard is the potential integration with the Software-Defined Networking (SDN) paradigm for the automated and dynamic enforcement of the restrictions included in a MUD profile as discussed by Hamza et al [5] and Ranganathan [6] by using OpenFlow [7].…”
Section: Introductionmentioning
confidence: 99%