Visible to the public Fending off IoT-hunting Attacks at Home Networks

TitleFending off IoT-hunting Attacks at Home Networks
Publication TypeConference Paper
Year of Publication2017
AuthorsMartin, Vincentius, Cao, Qiang, Benson, Theophilus
Conference NameProceedings of the 2Nd Workshop on Cloud-Assisted Networking
Date PublishedDecember 2017
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5423-3
Keywordshome network, honey pots, honeypot, IoT, Metrics, moving target defense, pubcrawl, Resiliency, Router Systems, security
Abstract

Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home network defense, Pot2DPI, and use it to raise an attacker's uncertainty about devices and enable the home network to monitor traffic, detect anomalies, and filter malicious packets. The security offered by Pot2DPI comes from a synthesis of practical techniques: honeypot, deep packet inspection (DPI), and a realization of moving target defense (MTD) in port forwarding. In particular, Pot2DPI has a chain of honeypot and DPI that collects suspicious packet traces, acquires attack signatures, and installs filtering rules at a home router timely. Meanwhile, Pot2DPI shuffles the mapping of ports between the router and the devices connected to it, making a targeted attack difficult and defense more effective. Pot2DPI is our first step towards securing a smart home.

URLhttp://doi.acm.org/10.1145/3155921.3160640
DOI10.1145/3155921.3160640
Citation Keymartin_fending_2017