Fending off IoT-hunting Attacks at Home Networks
Title | Fending off IoT-hunting Attacks at Home Networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Martin, Vincentius, Cao, Qiang, Benson, Theophilus |
Conference Name | Proceedings of the 2Nd Workshop on Cloud-Assisted Networking |
Date Published | December 2017 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5423-3 |
Keywords | home network, honey pots, honeypot, IoT, Metrics, moving target defense, pubcrawl, Resiliency, Router Systems, security |
Abstract | Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home network defense, Pot2DPI, and use it to raise an attacker's uncertainty about devices and enable the home network to monitor traffic, detect anomalies, and filter malicious packets. The security offered by Pot2DPI comes from a synthesis of practical techniques: honeypot, deep packet inspection (DPI), and a realization of moving target defense (MTD) in port forwarding. In particular, Pot2DPI has a chain of honeypot and DPI that collects suspicious packet traces, acquires attack signatures, and installs filtering rules at a home router timely. Meanwhile, Pot2DPI shuffles the mapping of ports between the router and the devices connected to it, making a targeted attack difficult and defense more effective. Pot2DPI is our first step towards securing a smart home. |
URL | http://doi.acm.org/10.1145/3155921.3160640 |
DOI | 10.1145/3155921.3160640 |
Citation Key | martin_fending_2017 |