Abstract
Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in security measures, leading to attacks increas- ing every year. In particular, network environments such as smart homes lack managed security capabilities to detect IoT-related at- tacks; IoT devices hosted therein are thus more easily infiltrated by threats. As such, context awareness on IoT infections is hard to achieve, preventing prompt response. In this work, we propose MUDscope, an approach to monitor malicious network activities affecting IoT in real-world consumer environments. We leverage the recent Manufacturer Usage Description (MUD) specification, which defines networking whitelists for IoT devices in MUD pro- files, to reflect consistent and necessarily-anomalous activities from smart things. Our approach characterizes this traffic and extracts signatures for given attacks. By analyzing attack signatures for multiple devices, we gather insights into emerging attack patterns. We evaluate our approach on both an existing dataset, and a new openly available dataset created for this research. We show that MUDscope detects several attacks targeting IoT devices with an F1-score of 95.77% and correctly identifies signatures for specific attacks with an F1-score of 87.72%.
Original language | English |
---|---|
Title of host publication | Proceedings of the Annual Computer Security Applications Conference, ACSAC 2022 |
Publisher | Applied Computer Security Associates |
Number of pages | 15 |
DOIs | |
Publication status | Published - 6 Dec 2022 |
Event | Annual Computer Security Applications Conference, ACSAC 2022 - Auston, United States Duration: 5 Dec 2022 → 9 Dec 2022 |
Conference
Conference | Annual Computer Security Applications Conference, ACSAC 2022 |
---|---|
Abbreviated title | ACSAC 2022 |
Country/Territory | United States |
City | Auston |
Period | 5/12/22 → 9/12/22 |
Keywords
- Cybersecurity