IoT-Lecture-22 IoT Security and Classification
IoT-Lecture-22 IoT Security and Classification
Dr Gaurav Singal
Netaji Subhas University of Technology, Delhi
IoT Security
IoT network traffic
classification
• Mechanism to categorizes
the embedded devices
connected to the internet and
security attacks in the
network.
• Beneficial to ensuring
security, reliability, quality of
services (QoS) and complete
working of IoT devices.
http://gauravsingal.in/dsci_project.html
Motivation
Fig: Number of IoT devices connected worldwide Fig.: IoT Attacks Statistics
Figure courtesy : https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/ Figure courtesy : https://www.cisecurity.org/blog/top-10-malware-july-2020/
Classification of Attacks on IoT
Physical Layer Data Link Layer Network Layer Transport Layer Application Layer
Raspberry Pi 4
NodeMCU (ESP8266) PIR Sensor
Transfer Packets
20 Real Time Clock Module Sensor 84:CC:A8:83:76:18 MQTT Control the Object for a specific time
Ensemble Techniques
1 4
2
3
Installation of Kali Linux on Windows (WSL) GUI
• Installation Steps as Follows:
➢ Step1 : 1 Click on Windows Start Button > 2 Click Settings > 3 Click Apps > 4 Click Programs & Features (Top Right Corner) > 5 Click Turn Windows Features on or off > 6
Tick (✓ ) on Window Subsystem for Linux
6
Installation of Kali Linux on Windows (WSL) GUI
• Installation Steps as Follows:
➢ Step2 : 1 Click on Microsoft Store > 2 Search Linux > 3 Click on Kali Linux App > 4 Click on Get for Download App > 5 Click on Launch
1
2
4&5
3
Installation of Kali Linux on Windows (WSL) GUI
• Installation Steps as Follows:
➢ Step2 : 1 Click on Microsoft Store > 2 Search Linux > 3 Click on Kali Linux App > 4 Click on Get for Download App > 5 Click on Launch
1
2
4&5
3
Installation of Kali Linux on Windows (WSL) GUI
• Installation Steps as Follows:
➢ Step3 : 1 Update your Kali Linux > 2 Install Scapy & Use installed software
➢ Step4: Mount local drives
1
Step 4
2
Pre-processing of IoT Traffic
• Network Traffic Capturing: Using Wireshark/TCPdump capturing the IoT network traffic.
• Splitting: Separate the IoT devices traffic from whole network traffic traces.
• Flow Construction: Construction of two types flows such as TCP & UDP from IoT traffic.
• Feature Extraction: Extract the three types of features such as packet level, flow level &
behavior level.
➢ Download Scapy :
https://scapy.readthedocs.io/en/latest/installation.html
➢ Scapy
✓ Packet Manipulation Python Tool
✓ Flow Construction
✓ Forge or Decode Packets
✓ Scanning
✓ Tracerouting
✓ Attacks
✓ Network Discovery
IoT Traffic Flow Construction
• Flow Construction: Construction of two types flows such as TCP & UDP from IoT traffic using
scapy & python.
• Feature Extraction: Extract the three types of features such as packet level, flow level &
behavior level.
90
80
Accuracy
70.443
70
59.949
60
50
KNN GNB DT RF Adaboost Adaboost Adaboost GB XGBoost Light GBM Bagging
(GNB) (DT) (RF) (GNB, DT,
RF)
ML Approaches
Existing Datasets
Three Way
Handshaking (1) SYN
(2) SYN/ACK
SOURCE DESTINATION
DoS SYN Flood Working
• The attacker sends a high volume of SYN packets to the targeted server,
often with spoofed IP addresses.
• The server then responds to each one of the connection requests and
leaves an open port ready to receive the response.
• While the server waits for the final ACK packet, which never arrives, the
attacker continues to send more SYN packets. The arrival of each new
SYN packet causes the server to temporarily maintain a new open port
connection for a certain length of time, and once all the available ports
have been utilized the server is unable to function normally.
BOT
Spoofed SYN Packets
?
?
ARP Protocol
• Address Resolution Protocol (ARP) is a protocol that enables network
communications to reach a specific device on the network.
• ARP translates Internet Protocol (IP) addresses to a Media Access Control (MAC)
address, and vice versa.
• Most commonly, devices use ARP to contact the router or gateway that enables
them to connect to the Internet.
• Hosts maintain an ARP cache, a mapping table between IP addresses and MAC
addresses, and use it to connect to destinations on the network. If the host
doesn’t know the MAC address for a certain IP address, it sends out an ARP
request packet, asking other machines on the network for the matching MAC
address.
ARP Spoofing
• ARP Spoofing also known as ARP Poisoning, is a Man in the Middle Attack (MitM)
that allows attackers to intercept communication between network devices.
• The two devices update their ARP cache entries and from that point onwards,
communicate with the attacker instead of directly with each other.
Working
• Must have access to the network.
• Scanning the network to determine the IP addresses of connected device
network.
• Attacker uses spoofing tool (i.e. Arpspoof) to forged ARP responses.
• The forged responses advertise that the correct MAC address for both IP
addresses, belonging to the router and workstation, is the attacker’s MAC
address. This fools both router and workstation to connect to the attacker’s
machine, instead of to each other.
• The two devices update their ARP cache entries and from that point onwards,
communicate with the attacker instead of directly with each other.
• The attacker is now secretly in the middle of all communications.
Smurf Attack
• It is a distributed denial-of-service attack in which large numbers of Internet Control
Message Protocol (ICMP) packets with the intended victim's spoofed source IP are
broadcast to a computer network using an IP broadcast address.
• Most devices on a network will, by default, respond to this by sending a reply to the
source IP address.
• If the number of machines on the network that receive and respond to these packets
is very large, the victim's computer will be flooded with traffic.
• This can slow down the victim's computer to the point where it becomes impossible
to work on.
Working
Ping of Death
• A Ping of Death attack is a denial-of-service (DoS) attack, in which the attacker
aims to disrupt a targeted machine by sending a packet larger than the maximum
allowable size, causing the target machine to freeze or crash.
• The original Ping of Death attack is less common today. A related attack known as
an ICMP flood attack is more prevalent.
• An Internet Control Message Protocol (ICMP) echo-reply message or “ping”, is a
network utility used to test a network connection, and it works much like sonar –
a “pulse” is sent out and the “echo” from that pulse tells the operator
information about the environment.
Working
• If the connection is working, the source machine receives a reply from the
targeted machine.
• While some ping packets are very small, IP4 ping packets are much larger, and can
be as large as the maximum allowable packet size of 65,535 bytes.
• Some TCP/IP systems were never designed to handle packets larger than the
maximum, making them vulnerable to packets above that size.
Working
References
1. Bai, Lei, Lina Yao, Salil S. Kanhere, Xianzhi Wang, and Zheng Yang. "Automatic device classification from
network traffic streams of internet of things." in Proceedings of the 43rd International Conference on Local
Computer Networks (LCN’18), 2018, pp. 1-9.
2. Yao, Haipeng, Pengcheng Gao, Jingjing Wang, Peiying Zhang, Chunxiao Jiang, and Zhu Han. "Capsule
Network Assisted IoT Traffic Classification Mechanism for Smart Cities." IEEE Internet of Things Journal,
vol. 6, pp. 7515-7525, 2019.
3. N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki, “Network intrusion detection for iot
security based on learning techniques,” IEEE Communications Surveys & Tutorials, vol. 21, pp. 2671– 2701,
2019.
4. Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer 50.7 (2017): 80-84.
5. Sivanathan, Arunan, Hassan Habibi Gharakheili, Franco Loi, Adam Radford, Chamith Wijenayake, Arun
Vishwanath, and Vijay Sivaraman. "Classifying IoT devices in smart environments using network traffic
characteristics." IEEE Transactions on Mobile Computing, vol. 18, pp. 1745-1759, 2019.
6. M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the iot world: Present and
future challenges,” IEEE Internet of Things Journal, vol. 5, pp. 2483–2495, 2017.
7. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,”
IEEE Internet of Things Journal, vol. 4, pp. 1250–1258, 2017.
8. Q. Yan, W. Huang, X. Luo, Q. Gong, and F. R. Yu, “A multi-level ddos mitigation framework for the industrial
internet of things,” IEEE Communications Magazine, vol. 56, pp. 30–36, 2018.
References
9. I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, “Anatomy of threats to the internet of things,”
IEEE Communications Surveys & Tutorials, vol. 21, pp. 1636–1675, 2018.
10. J. Granjal, E. Monteiro, and J. S. Silva, “Security for the internet of things: a survey of existing protocols and
open research issues,” IEEE Communications Surveys & Tutorials, vol. 17, pp. 1294–1312, 2015.
11. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying iot security: an
exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations,” IEEE
Communications Surveys & Tutorials, pp. 2702–2733, 2019.
12. S. Murali and A. Jamalipour, “A lightweight intrusion detection for sybil attack under mobile rpl in the
internet of things, ”IEEE Internet of Things Journal (Early Access), vol. 6.
13. https://blackarch.org/spoof.html
14. https://www.networkworld.com/article/2272520/six-worst-internet-routing-attacks.html
15. https://www.infosecurity-magazine.com/news/massive-bruteforce-attack-on/
16. https://canadiandimension.com/articles/view/web-exclusive-author-calls-on-ccla-board-members-to-
repudiate-attack-on-dis
17. S. Li, L. Da Xu, and S. Zhao, “The internet of things: a survey,” Information Systems Frontiers, vol. 17, pp.
243–259, 2015.
18. https://posts.specterops.io/cve-2018-8414-a-case-study-in-responsible-disclosure-ff74c39615ba
19. https://www.cvedetails.com/cve/CVE-2019-0735/
References
20. A. Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Transactions on
Emerging Topics in Computing, vol. 5, pp. 586–602, 2016
21. https://www.kaspersky.com/blog/five-most-notorious-cyberattacks/24506/
22. https://medium.com/ledger-on-security-and-blockchain/introducing-rainbow-donjons-side-channel-
analysis-simulation-tool-2f23fa1f11b3
23. Pinheiro, Antônio J., Jeandro de M. Bezerra, Caio AP Burgardt, and Divanilson R. Campelo, "Identifying
IoT devices and events based on packet length from encrypted traffic" Computer Communications, vol.
144, pp. 8-17, 2019.
24. A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Managing iotcyber-security using programmable
telemetry and machine learning,”IEEE Transactions on Network and Service Management, vol. 17, pp.60–
74, 2020.
25. J. Ortiz, C. Crawford, and F. Le, “Devicemien: network device behaviour modelling for identifying
unknown iot devices,” in Proceedings of the 2nd International Conference on Internet of Things Design and
Implementation(IOTDI’19, 2019, pp. 106–117.
References
26. Lopez-Martin, Manuel, Belen Carro, and Antonio Sanchez-Esguevillas. "Neural network architecture based
on gradient boosting for IoT traffic prediction.“ Future Generation Computer Systems , vol. 100, pp. 656-
673, 2019.
27. M. Lopez-Martin, B. Carro, and A. Sanchez-Esguevillas, “Iot type-of-traffic forecasting method based on
gradient boosting neural networks.” Future Generation Computer Systems, vol. 105, pp. 331–345, 2020.
28. https://www.3pillarglobal.com/insights/approaches-tools-techniques-for-security-testing
29. https://resources.infosecinstitute.com/popular-tools-for-brute-force-attacks/#gref
30. https://www.itpro.co.uk/security/innovation-at-work/29577/the-10-best-or-should-that-be-worst-malware
31. Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer 50.7, pp. 80-84, 2017
32. Nguyen, Thanh Thi, and Vijay Janapa Reddi. "Deep reinforcement learning for cyber security." arXiv
preprint arXiv:1906.05799 (2019).
Thank You
For more information, please visit the
following links:
[email protected]
[email protected]
https://www.linkedin.com/in/gauravsingal789/
http://www.gauravsingal.in
18 April 2022
76