Combining MUD Policies with SDN for IoT Intrusion Detection

Ayyoob Hamza, H. Gharakheili, V. Sivaraman
{"title":"Combining MUD Policies with SDN for IoT Intrusion Detection","authors":"Ayyoob Hamza, H. Gharakheili, V. Sivaraman","doi":"10.1145/3229565.3229571","DOIUrl":null,"url":null,"abstract":"The IETF's push towards standardizing the Manufacturer Usage Description (MUD) grammar and mechanism for specifying IoT device behavior is gaining increasing interest from industry. The ability to control inappropriate communication between devices in the form of access control lists (ACLs) is expected to limit the attack surface on IoT devices; however, little is known about how MUD policies will get enforced in operational networks, and how they will interact with current and future intrusion detection systems (IDS). We believe this paper is the first attempt to translate MUD policies into flow rules that can be enforced using SDN, and in relating exception behavior to attacks that can be detected via off-the-shelf IDS. Our first contribution develops and implements a system that translates MUD policies to flow rules that are proactively configured into network switches, as well as reactively inserted based on run-time bindings of DNS. We use traces of 28 consumer IoT devices taken over several months to evaluate the performance of our system in terms of switch flow-table size and fraction of exception traffic that needs software inspection. Our second contribution identifies the limitations of flow-rules derived from MUD in protecting IoT devices from internal and external network attacks, and we show how our system is able to detect such volumetric attacks (including port scanning, TCP/UDP/ICMP flooding, ARP spoofing, and TCP/SSDP/SNMP reflection) by sending only a very small fraction of exception packets to off-the-shelf IDS.","PeriodicalId":20541,"journal":{"name":"Proceedings of the 2018 Workshop on IoT Security and Privacy","volume":"53 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"78","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2018 Workshop on IoT Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3229565.3229571","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 78

Abstract

The IETF's push towards standardizing the Manufacturer Usage Description (MUD) grammar and mechanism for specifying IoT device behavior is gaining increasing interest from industry. The ability to control inappropriate communication between devices in the form of access control lists (ACLs) is expected to limit the attack surface on IoT devices; however, little is known about how MUD policies will get enforced in operational networks, and how they will interact with current and future intrusion detection systems (IDS). We believe this paper is the first attempt to translate MUD policies into flow rules that can be enforced using SDN, and in relating exception behavior to attacks that can be detected via off-the-shelf IDS. Our first contribution develops and implements a system that translates MUD policies to flow rules that are proactively configured into network switches, as well as reactively inserted based on run-time bindings of DNS. We use traces of 28 consumer IoT devices taken over several months to evaluate the performance of our system in terms of switch flow-table size and fraction of exception traffic that needs software inspection. Our second contribution identifies the limitations of flow-rules derived from MUD in protecting IoT devices from internal and external network attacks, and we show how our system is able to detect such volumetric attacks (including port scanning, TCP/UDP/ICMP flooding, ARP spoofing, and TCP/SSDP/SNMP reflection) by sending only a very small fraction of exception packets to off-the-shelf IDS.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
结合MUD策略和SDN实现物联网入侵检测
IETF正在推动标准化制造商使用描述(MUD)语法和机制,以指定物联网设备的行为,这引起了业界越来越多的兴趣。以访问控制列表(acl)的形式控制设备之间不适当通信的能力预计将限制物联网设备的攻击面;然而,对于MUD策略将如何在操作网络中执行,以及它们将如何与当前和未来的入侵检测系统(IDS)交互,人们知之甚少。我们相信这篇论文是第一次尝试将MUD策略转换成可以使用SDN强制执行的流规则,并将异常行为与可以通过现成的IDS检测到的攻击联系起来。我们的第一个贡献是开发和实现一个系统,该系统将MUD策略转换为流规则,这些流规则被主动配置到网络交换机中,并根据DNS的运行时绑定被动地插入。我们使用了28个消费者物联网设备在几个月内的跟踪来评估我们系统的性能,包括交换机流表大小和需要软件检查的异常流量的比例。我们的第二个贡献确定了来自MUD的流量规则在保护物联网设备免受内部和外部网络攻击方面的局限性,并且我们展示了我们的系统如何能够通过仅向现货IDS发送非常小的异常数据包来检测此类容量攻击(包括端口扫描,TCP/UDP/ICMP泛流,ARP欺骗和TCP/SSDP/SNMP反射)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blockchain‐Based Cyber Physical Trust Systems Index Introduction to IoT Traversing the Quagmire that is Privacy in your Smart Home Proceedings of the 2018 Workshop on IoT Security and Privacy
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1