Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach
Title | Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Vieira, Leandro, Santos, Leonel, Gon\c calves, Ramiro, Rabadão, Carlos |
Conference Name | 2019 14th Iberian Conference on Information Systems and Technologies (CISTI) |
Date Published | jun |
Keywords | attack signature, computer network security, defense mechanisms, flow monitoring, Internet, Internet of Things, Intrusion detection, Intrusion Detection Systems, IoT communications, IoT devices, IP flow properties, IP networks, Monitoring, network attacks, network intrusion detection, privacy, Protocols, pubcrawl, resilience, Resiliency, resource limitations, Scalability, security, security mechanisms, sensitive information, signature based defense, telecommunication traffic, Tools |
Abstract | At the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties. |
DOI | 10.23919/CISTI.2019.8760650 |
Citation Key | vieira_identifying_2019 |
- Monitoring
- tools
- telecommunication traffic
- sensitive information
- security mechanisms
- security
- Scalability
- resource limitations
- Resiliency
- resilience
- Protocols
- privacy
- network intrusion detection
- network attacks
- signature based defense
- IP networks
- IP flow properties
- IoT devices
- IoT communications
- Intrusion Detection Systems
- Intrusion Detection
- Internet of Things
- internet
- flow monitoring
- defense mechanisms
- computer network security
- attack signature
- pubcrawl