PlumeWalk: Towards Threat Provenance Localization for IoT Networks

2019 11th International Conference on Communication Systems & Networks (COMSNETS)(2019)

引用 1|浏览19
暂无评分
摘要
IoT network security is generally viewed from the perspective of a single, or few attack surfaces. A general characterization of attack source threat provenance (origin) under multiple concurrently prevailing attacks can be useful for mitigating origins of attacks and studying the profile of propagating threats. This paper proposes a novel graph theoretic threat provenance identification framework for IoT networks called PlumeWalk. Our framework helps in securing large-sized networks by providing fast and accurate topological characterization of threat provenance as implied by the network traffic, and the network configuration. PlumeWalk is efficiently computable on computationally constrained IoT devices. We simulate attacks on confidentiality, integrity and availability of IoT sensors with different transport reliabilities to evaluate the accuracy and compute time savings of PlumeWalk. We show that PlumeWalk outperforms a measure called “Betweenness Centrality” for flagging threat presence, by using lesser compute time and providing better characterization of attack origin / impact. Finally, we compare PlumeWalk with relevant contemporary solutions for modeling IoT network attack characterization and threat propagation.
更多
查看译文
关键词
IoT networks,IoT network security,attack source threat provenance,PlumeWalk,large-sized networks,network traffic,network configuration,computationally constrained IoT devices,IoT sensors,compute time savings,threat presence,threat propagation,threat provenance localization,IoT network attack characterization,graph theoretic threat provenance identification framework,attack origin/impact
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要