首页> 外文会议>International Conference on Internet of Things >Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems
【24h】

Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems

机译:比泥更清晰:扩展制造商使用说明(MUD)来保护IOT系统

获取原文

摘要

Internet of Things (IoT) devices, expected to increase exponentially over the next several years, are easy targets for attackers. To make these devices more secure, the IETF's draft of Manufacturer Usage Description (MUD) provides a means for the manufacturer of an IoT device to specify its intended purpose and communication patterns in terms of access control lists (ACLs), thereby defining the device's normal behaviour. However, MUD may not be sufficient to comprehensively capture the normal behaviour specification, as it cannot incorporate variable operational settings that depend on the environment. Further, MUD only supports limited features. Our approach overcomes these limitations by allowing the administrator to define the normal behaviour by choosing combinations from a wider set of features that includes physical layer parameters, values of packet headers, and flow statistics. We developed and implemented a learning-based system that captures and demodulates wireless packets from IoT devices over a period of time, extracts the features specified in the normal behaviour specification, and uses a learning algorithm to create a normal model of each device. Our implementation also enforces these normal models by detecting violations and taking appropriate actions, in terms of ACLs on an Internet Gateway, against the misbehaving devices. Hence, our framework makes the specification tighter and clearer than what is possible with MUD alone, thereby making IoT systems more secure.
机译:物联网(IOT)装置,预计在未来几年成倍增长的互联网,是攻击者容易攻击的目标。为了使这些装置更安全,IETF的制造商的用法说明(MUD)的草案提供了一种装置,用于IOT中设备的制造商在访问控制列表的术语(ACL)来指定其预期目的和通信模式,由此限定该设备的正常行为。但是,MUD可能不足以全面捕捉正常行为规范,因为它不能结合依赖于环境变量操作设置。此外,MUD仅支持有限的功能。我们的方法通过允许管理员通过从更广泛的一组特征,其包括物理层参数,分组报头的值,以及流选择统计组合来定义正常行为克服了这些限制。我们制定并实施了基于学习的系统,捕获和解调从物联网设备在一段时间内的无线数据包,提取正常的行为规范中规定的功能,并使用学习算法来创建每个设备的正常模式。我们的实现还通过检测违规行为,并采取适当的行动,在互联网网关的ACL方面,对行为不端的设备执行这些正常模式。因此,我们的框架使得规格比单纯是可能的MUD更严格,更清晰,从而使物联网系统更安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号