| Literature DB >> 30934750 |
Pantaleone Nespoli1, David Useche Pelaez2, Daniel Díaz López3, Félix Gómez Mármol4.
Abstract
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).Entities:
Keywords: Internet of Things; intrusion detection system; machine learning; malware detection; sentinel for the IoT; smart home; threat intelligence
Year: 2019 PMID: 30934750 PMCID: PMC6479720 DOI: 10.3390/s19071492
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Abstract view of COSMOS.
Figure 2High level architecture of COSMOS.
Monitored statistics and input parameters for COSMOS intrusion detection experiments.
| Category | Name | Description |
|---|---|---|
|
| CPU | Raspberry Pi CPU usage along an experiment time lapse |
| RAM | Raspberry Pi RAM usage along an experiment time lapse | |
| Analyzed packets | No. of packets analyzed from the IDSs | |
|
| RuleSets | {connectivity, balanced, security} |
| Detection Algorithms | {lowmem, ac-bnfa, ac-split} | |
| Time window | 8-h |
Figure 3COSMOS IDSs CPU usage.
Figure 4COSMOS IDSs RAM usage.
Monitored statistics during the experiments.
| Name | Description |
|---|---|
| CPU | Raspberry Pi CPU usage for a given experiment |
| RAM | Raspberry Pi RAM usage for a given experiment |
| Response time | Time required to analyze a sample |
| Detection rate | Percentage of detected malware |
Figure 5Results of the experiments conducted on COSMOS w.r.t Android malware detection.
Figure 6Results of the experiments conducted on COSMOS w.r.t generic malware detection.
Figure 7COSMOS App deployment overview.
Figure 8COSMOS App screenshots.
Comparative table of the analyzed related works.
| Related Work | Methodology | Scenario | Security Goals | |||
|---|---|---|---|---|---|---|
|
|
|
|
| |||
| Ning and Liu [ | Security from three perspectives | IoT ecosystem | N.A. |
|
| N.A. |
| Dorri et al. [ | Adapt current technology to IoT Scenario | Smart Home |
| N.A. |
|
|
| Riahi et al. [ | Systematic approach to improve IoT security | IoT ecosystem | N.A. | N.A. | N.A. | N.A. |
| Babar et al. [ | Embedded security in all stages of device lifecycle | IoT ecosystem |
|
|
|
|
| Rahman et al. [ | Embedded security in each layer of the IoT ecosystem | IoT ecosystem |
|
|
|
|
| Abie and Balasingham [ | Risk management based security | e-Health | N.A. |
|
| N.A. |
| Cheng et al. [ | Traffic aware patching intermediate nodes | IoT ecosystem |
|
|
| N.A. |
| Roux et al. [ | Identification of suspicious behavior at physical layer | IoT network |
|
|
|
|
| Hodo et al. [ | Detection of DDoS attacks | IoT network |
|
|
|
|
| Meidan et al. [ | Detection of unauthorized devices in the network | IoT network |
|
|
|
|
| Pa et al. [ | Honeypot and Sandboxing | IoT ecosystem |
|
|
|
|
| Sivaraman et al. [ | SDN Networks to detect and block devices | IoT network |
|
|
|
|
| Sforzin et al. [ | Single-board computer IDS | Smart Home |
|
|
|
|
| Nespoli and Gómez Mármol [ | Wireless IDS with SIEM integration | e-Health |
|
|
|
|
| Miettinen et al. [ | IoT Sentinel to protect and identify IoT nodes | IoT network |
|
|
|
|