The number of IoT devices continues to grow despite the alarming rate of identification of security and privacy issues. There is widespread concern that development of IoT devices is performed without sufficient attention paid to security and privacy issues. Consequently, networks have a higher probability of incorporating vulnerable IoT devices that may be easy to compromise to launch cyber attacks. Inclusion of IoT devices paves the way for a new category of anomalies to be introduced to networks. Traditional anomaly detection techniques (e.g., semi-supervised and signature-based methods), however, are likely inefficient in detecting IoT-based anomalies. This is because these techniques require static signatures of known attacks, specialized hardware, or full packet inspection. They are also expensive, and may be inaccurate or unscalable. Vulnerable IoT devices can be used to perform destructive attacks or invade privacy. The ability to find anomalies in IoT traffic has the potential to assist with early detection and deployment of countermeasures to thwart such attacks. Thus, new techniques for detecting infected IoT devices are needed to mitigate the associated security and privacy risks. In this research, we investigate the possibility to identify IoT traffic using a combination of behavioural profile, predefined blocklist and device fingerprint. Such a system may be able to detect anomalous and/or malicious devices and/or traffic reliably and quickly. Initial results show that for our implementation of such a system, IoT traffic can be identified using device behaviour profile, fingerprint, and contacted destinations. This work takes the first step towards designing and evaluating iDetector, a framework that can detect anomalous behaviour within IoT networks. In our experiments, iDetector was able to correctly identify 80--90% of all captured traffic traversing a home gateway.
[1]
Nick Feamster,et al.
IoT Inspector
,
2020,
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[2]
Ralph E. Droms,et al.
Manufacturer Usage Description Specification
,
2019,
RFC.
[3]
Hamed Haddadi,et al.
When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers
,
2020,
Proc. Priv. Enhancing Technol..
[4]
Theophilus A. Benson,et al.
Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity
,
2019,
SOSR.
[5]
Hamed Haddadi,et al.
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach
,
2019,
Internet Measurement Conference.