|
Using manufacturer usage descriptions for IoT network security: An experimental investigation of smart home network devices
|
Authors: Milad Kazemi Darazam, Pelin Angin, Cengiz Acarturk Status: Final Date of publication: 22 September 2022 Published in: ITU Journal on Future and Evolving Technologies, Volume 3 (2022), Issue 2, Pages 388-407 Article DOI : https://doi.org/10.52953/NSQZ3214
|
Abstract: The Internet of Things (IoT) has shown significant growth in the past decades. Recently, IoT networks have been subject to cybersecurity threats on multiple fronts. A lack of improvement in IoT infrastructures' cybersecurity may result in challenges with a broad impact, such as DDoS attacks that target global DNS services. This paper reviews existing solutions to mitigate attacks on and from IoT networks. As a specific mitigation approach, we propose the use of a standardized whitelisting method, namely Manufacturer Usage Description (MUD), which provides enhanced explainability over machine learning-based approaches and is complementary to them. For evaluating the use of MUD in IoT networks, we report a case study, which we conducted through traffic analysis of two IoT devices by detecting recognizable and distinctive traffic patterns, which demonstrate the feasibility of MUD-based intrusion prevention. |
Keywords: IoT networks, manufacturer usage description, smart home security, traffic patterns Rights: © International Telecommunication Union, available under the CC BY-NC-ND 3.0 IGO license.
|
|
Detalle del artículo | Artículo | Precio | |
---|
| 0
| Gratuito | Descargar |
|
| |