Verifying and Monitoring IoTs Network Behavior using MUD Profiles

作者: Hassan Habibi Gharakheili , Matthew Roughan , Theophilus A. Benson , Dinesha Ranathunga , Vijay Sivaraman

DOI:

关键词:

摘要: IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order reduce this risk, IETF is pushing vendors develop formal specifications of intended purpose their devices, form a Manufacturer Usage Description (MUD), so that network behavior any operating environment can be locked down verified rigorously. This paper aims assist manufacturers developing verifying MUD profiles, while also helping adopters these ensure compatible with organizational policies track based on profile. Our first contribution tool takes traffic trace an arbitrary device as input automatically generates profile for it. We contribute our open source, apply it 28 consumer highlight insights challenges encountered process. second semantic framework not only validates given consistency, but checks its compatibility policy. representative organizations selected demonstrate how effort needed acceptance testing. Finally, we show operators dynamically identify using known profiles monitor behavioral changes network.

参考文章(19)
Avishai Wool, Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese IEEE Internet Computing. ,vol. 14, pp. 58- 65 ,(2010) , 10.1109/MIC.2010.29
A. Wool, A quantitative study of firewall configuration errors IEEE Computer. ,vol. 37, pp. 62- 67 ,(2004) , 10.1109/MC.2004.2
E. Al-Shaer, H. Hamed, R. Boutaba, M. Hasan, Conflict classification and analysis of distributed firewall policies IEEE Journal on Selected Areas in Communications. ,vol. 23, pp. 2069- 2084 ,(2005) , 10.1109/JSAC.2005.854119
Jennifer L Bayuk, None, Systems Security Engineering IEEE Security & Privacy Magazine. ,vol. 9, pp. 72- 74 ,(2011) , 10.1109/MSP.2011.41
Vijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli, Smart-Phones Attacking Smart-Homes wireless network security. pp. 195- 200 ,(2016) , 10.1145/2939918.2939925
Dinesha Ranathunga, Matthew Roughan, Hung Nguyen, Phil Kernick, Nickolas Falkner, Case Studies of SCADA Firewall Configurations and the Implications for Best Practices IEEE Transactions on Network and Service Management. ,vol. 13, pp. 871- 884 ,(2016) , 10.1109/TNSM.2016.2597245
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Malachite: Firewall policy comparison international symposium on computers and communications. pp. 310- 317 ,(2016) , 10.1109/ISCC.2016.7543759
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen, Marian Mihailescu, Michelle McClintock, Verifiable Policy-defined Networking for Security Management Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. pp. 344- 351 ,(2016) , 10.5220/0005990303440351
D. Ranathunga, H. Nguyen, M. Roughan, MGtoolkit: A python package for implementing metagraphs SoftwareX. ,vol. 6, pp. 91- 93 ,(2017) , 10.1016/J.SOFTX.2017.04.001
Keith Stouffer, Joe Falco, Karen Scarfone, Guide to Industrial Control Systems (ICS) Security Special Publication (NIST SP) - 800-82 Rev 1. ,(2015) , 10.6028/NIST.SP.800-82R2