首页> 外文会议>International Conference on Internet of Things;Services Conference Federation >Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems
【24h】

Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems

机译:比泥更清晰:扩展制造商使用说明(MUD)以保护物联网系统

获取原文

摘要

Internet of Things (IoT) devices, expected to increase exponentially over the next several years, are easy targets for attackers. To make these devices more secure, the IETF's draft of Manufacturer Usage Description (MUD) provides a means for the manufacturer of an IoT device to specify its intended purpose and communication patterns in terms of access control lists (ACLs), thereby defining the device's normal behaviour. However, MUD may not be sufficient to comprehensively capture the normal behaviour specification, as it cannot incorporate variable operational settings that depend on the environment. Further, MUD only supports limited features. Our approach overcomes these limitations by allowing the administrator to define the normal behaviour by choosing combinations from a wider set of features that includes physical layer parameters, values of packet headers, and flow statistics. We developed and implemented a learning-based system that captures and demodulates wireless packets from IoT devices over a period of time, extracts the features specified in the normal behaviour specification, and uses a learning algorithm to create a normal model of each device. Our implementation also enforces these normal models by detecting violations and taking appropriate actions, in terms of ACLs on an Internet Gateway, against the misbehaving devices. Hence, our framework makes the specification tighter and clearer than what is possible with MUD alone, thereby making IoT systems more secure.
机译:物联网(IoT)设备预计在未来几年内呈指数级增长,是攻击者的轻松目标。为了使这些设备更安全,IETF的制造商使用说明(MUD)草案为IoT设备的制造商提供了一种手段,使其可以根据访问控制列表(ACL)来指定其预期的目的和通信模式,从而定义设备的正常状态。行为。但是,MUD可能不足以全面捕获正常的行为规范,因为它不能合并取决于环境的可变操作设置。此外,MUD仅支持有限的功能。我们的方法通过允许管理员从包括物理层参数,数据包头值和流统计信息在内的更广泛的功能集中选择组合来定义正常行为,从而克服了这些限制。我们开发并实现了一个基于学习的系统,该系统可以在一段时间内捕获和解调来自IoT设备的无线数据包,提取正常行为规范中指定的功能,并使用学习算法为每个设备创建正常模型。我们的实现还通过检测违规行为并针对Internet行为不当的设备采取针对Internet网关上的ACL的措施,从而实施了这些正常模型。因此,与单独使用MUD相比,我们的框架使规范更加严格和清晰,从而使IoT系统更安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号