Using redundancy to detect security anomalies: towards IoT security attack detectors
Title | Using redundancy to detect security anomalies: towards IoT security attack detectors |
Publication Type | Magazine Article |
Year of Publication | 2016 |
Authors | Roopak Venkatakrishnan, Mladen A. Vouk |
Magazine | Ubiquity |
Volume | 2016 |
Issue Number | January |
Pagination | 1-19 |
Keywords | Vulnerability and Resilience Prediction Models |
Abstract | Cyber-attacks and breaches are often detected too late to avoid damage. While "classical" reactive cyber defenses usually work only if we have some prior knowledge about the attack methods and "allowable" patterns, properly constructed redundancy-based anomaly detectors can be more robust and often able to detect even zero day attacks. They are a step toward an oracle that uses knowable behavior of a healthy system to identify abnormalities. In the world of Internet of Things (IoT), security, and anomalous behavior of sensors and other IoT components, will be orders of magnitude more difficult unless we make those elements security aware from the start. In this article we examine the ability of redundancy-based a nomaly detectors to recognize some high-risk and difficult to detect attacks on web servers--a likely management interface for many IoT stand-alone elements. In real life, it has taken long, a number of years in some cases, to identify some of the vulnerabilities and related attacks. We discuss practical relevance of the approach in the context of providing high-assurance Webservices that may belong to autonomous IoT applications and devices |
URL | http://ubiquity.acm.org/article.cfm?id=2822881 |
DOI | 10.1145/2822881 |
Citation Key | node-24178 |