Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System

The Internet of Things (IoT) connects not only computers and mobile devices, but it also interconnects smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. However, IoT applications introduce grand security challenges due to the increase in the attack surface. Current security approaches do not handle cybersecurity from a holistic point of view; hence a systematic cybersecurity mechanism needs to be adopted when designing IoTbased applications. In this work, we present a risk management framework to deploy secure IoT-based applications for Smart Infrastructures at the design time and the runtime. At the design time, we propose a risk management method that is appropriate for smart infrastructures. At the design time, our framework relies on the Anomaly Behavior Analysis (ABA) methodology enabled by the Autonomic Computing paradigm and an intrusion detection system to detect any threat that can compromise IoT infrastructures by. Our preliminary experimental results show that our framework can be used to detect threats and protect IoT premises and services.

[1]  Gregory A. Witte,et al.  Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .

[2]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[3]  Azeddine Bilami,et al.  Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things , 2015, Comput. Networks.

[4]  Philippe Aniorte,et al.  Challenges in Security Engineering of Systems-of-Systems , 2014 .

[5]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[6]  David Cooper,et al.  Server-Based Certificate Validation Protocol (SCVP) , 2007, RFC.

[7]  Tai-Myung Chung,et al.  Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security , 2007, International Conference on Computational Science.

[8]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[9]  Vinod Namboodiri,et al.  Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.

[10]  Youakim Badr,et al.  Managing End-to-End Security Risks with Fuzzy Logic in Service-Oriented Architectures , 2013, 2013 IEEE Ninth World Congress on Services.

[11]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[12]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[13]  Yang Xiao,et al.  A Survey of Security in Telemedicine with Wireless Sensor Networks , 2008 .

[14]  Youakim Badr,et al.  Risk management and security in service-based architectures , 2009, 2009 International Conference on Advances in Computational Tools for Engineering Applications.

[15]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[16]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[17]  Yoshiaki Kakuda,et al.  A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[18]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.