作者: Hassan Habibi Gharakheili , Matthew Roughan , Theophilus A. Benson , Dinesha Ranathunga , Vijay Sivaraman
DOI:
关键词:
摘要: IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order reduce this risk, IETF is pushing vendors develop formal specifications of intended purpose their devices, form a Manufacturer Usage Description (MUD), so that network behavior any operating environment can be locked down verified rigorously. This paper aims assist manufacturers developing verifying MUD profiles, while also helping adopters these ensure compatible with organizational policies track based on profile. Our first contribution tool takes traffic trace an arbitrary device as input automatically generates profile for it. We contribute our open source, apply it 28 consumer highlight insights challenges encountered process. second semantic framework not only validates given consistency, but checks its compatibility policy. representative organizations selected demonstrate how effort needed acceptance testing. Finally, we show operators dynamically identify using known profiles monitor behavioral changes network.