Publication Details
Security Monitoring of IoT Communication Using Flows
MATOUŠEK Petr, RYŠAVÝ Ondřej and GRÉGR Matěj. Security Monitoring of IoT Communication Using Flows. In: Proceedings of the 6th Conference on the Engineering of Computer Based Systems. ECBS '19. New York: Association for Computing Machinery, 2019, pp. 1-9. ISBN 978-1-4503-7636-5. Available from: http://doi.acm.org/10.1145/3352700.3352718
Czech title
Bezpečnostní monitorování IoT komunikace pomocí toků
Type
conference paper
Language
english
Authors
Matoušek Petr, doc. Ing., Ph.D., M.A. (DIFS FIT BUT)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS FIT BUT)
Grégr Matěj, Ing., Ph.D. (DIFS FIT BUT)
Ryšavý Ondřej, doc. Ing., Ph.D. (DIFS FIT BUT)
Grégr Matěj, Ing., Ph.D. (DIFS FIT BUT)
URL
Keywords
Internet of Things, security, monitoring, statistical anomaly detection,
IPFIX, CoAP
Abstract
Network monitoring is an important part of network management that collects valuable metadata describing active communication protocols, network transmissions, bandwidth utilization, and the most communicating nodes. Traditional IP network monitoring techniques include the SNMP system, flow monitoring, or system logging. The environment of the Internet of Things (IoT) networks, however, shows that these approaches do not provide sufficient visibility of IoT communication which would allow network administrators to identify possible attacks on IoT nodes. The reason is obvious: IoT devices lack sufficient computational resources to fully implement monitoring agents, LAN IoT data communication is often directly over data link layers rather than IP, and IoT sensors produce an endless flow of small packets which can be difficult to process in real-time. To tackle these limitations we propose a new IoT monitoring model based on extended IPFIX records. The model employs a passive monitoring probe that observes IoT traffic and collects metadata from IoT protocols. Using extended IPFIX protocol, flow records with IoT metadata are sent to the collector where they are analyzed and used to provide a global view on the whole IoT network and its communication. We also present two statistical approaches that analyze IoT flows data in order to detect security incidents or malfunctioning of a device. The proof-of-concept implementation is demonstrated for Constrained Application Protocol (CoAP) traffic in the smart home environment.
Published
2019
Pages
1-9
Proceedings
Proceedings of the 6th Conference on the Engineering of Computer Based Systems
Series
ECBS '19
Conference
6th Conference on the Engineering of Computer Based Systems, Bucharest, RO
ISBN
978-1-4503-7636-5
Publisher
Association for Computing Machinery
Place
New York, US
DOI
UT WoS
000525376600018
EID Scopus
BibTeX
@INPROCEEDINGS{FITPUB12069, author = "Petr Matou\v{s}ek and Ond\v{r}ej Ry\v{s}av\'{y} and Mat\v{e}j Gr\'{e}gr", title = "Security Monitoring of IoT Communication Using Flows", pages = "1--9", booktitle = "Proceedings of the 6th Conference on the Engineering of Computer Based Systems", series = "ECBS '19", year = 2019, location = "New York, US", publisher = "Association for Computing Machinery", ISBN = "978-1-4503-7636-5", doi = "10.1145/3352700.3352718", language = "english", url = "https://www.fit.vut.cz/research/publication/12069" }
Files