Abstract
With the emergence of Internet and embedded computing, Internet of Things (IoT) is currently becoming an area of interest amongst researches. IoT enable interconnection of embedded devices capable of running application like smart grid, smart traffic control, remote health monitoring etc. As the IoT devices can be connected virtually as well as physically, cyber attacks are likely to become a major threat. An attacker who have an access to the on-board network connecting IoT devices or appliances can spy on people, can inject malicious code into these embedded devices creating serious security concerns. In this work, we propose a framework to monitor security threats possible on IoT devices. The framework consists of several modules like data capture, anomaly detector and alert generator. The data capture module collects the application level data, transport and network headers of the traffic that goes into the IoT device. The anomaly detector module uses a signature based approach to detect threats. The proposed framework is tested on a testbed comprising of Arduino boards with Wiznet Ethernet shield as the IoT device communicate with Samsung Android smart-phone over a bridge connected through WiFi. We ran SNORT Intrusion Detector on the bridge with rules for generating alerts for intrusion.
References
Y. Berhanu, H. Abie, and M. Hamdi. A testbed for adaptive security for iot in ehealth. In Proceedings of the International Workshop on Adaptive Security, page 5. ACM, 2013.
O. S. Lab. The 2015 internet of things in the enterprise report: Executive summary. available online at:. http://info.opendns.com/rs/033-OMP-861/images/OpenDNS-2015-IoT-Executive-Summary.pdf/. Accessed on July 2015.
Souliss. Souliss. available online at:. https://code.google.com/p/souliss/. Accessed on Jan 2015.
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle. Security challenges in the ip-based internet of things. Wireless Personal Communications, 61(3):527–542, 2011.
A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351–355. IEEE, 2013.
G. S. John Pescatore. Securing the internet of things survey. available online at:. https://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785/. Accessed on Feb 2015.
Wireshark. Wireshark. available online at:. https://wireshark.org/, 2015.
Arduino. Arduino. available online at:. http://arduino.cc/en/Main/Software/. Accessed on Jan 2015.
Wiznet. Wiznet ethernet w5100. available online at:. https://sparkfun.com/datasheets/. Accessed on Jan 2015.
S. A5.2.1. Souliss archive. available online at:. https://souliss.googlecode.com/archive/A5.2.1/. Accessed on Jan 2015.
Acknowledgments
This work was supported by grant from Tata Consultancy Services (TCS) under research scholar program, India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Danda, J.M.R., Hota, C. (2016). Attack Identification Framework for IoT Devices. In: Satapathy, S.C., Mandal, J.K., Udgata, S.K., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 434. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2752-6_49
Download citation
DOI: https://doi.org/10.1007/978-81-322-2752-6_49
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2750-2
Online ISBN: 978-81-322-2752-6
eBook Packages: EngineeringEngineering (R0)