IoT (D)DoS prevention and corporate responsibility A model to - - PowerPoint PPT Presentation

iot d dos prevention and corporate responsibility
SMART_READER_LITE
LIVE PREVIEW

IoT (D)DoS prevention and corporate responsibility A model to - - PowerPoint PPT Presentation

IoT (D)DoS prevention and corporate responsibility A model to prevent internet pollution and liability claims alike S. Scholtes June 7, 2019 Research Project 2 Master of System and Network Engineering Institute of Informatics University of


slide-1
SLIDE 1

IoT (D)DoS prevention and corporate responsibility

A model to prevent internet pollution and liability claims alike

  • S. Scholtes

June 7, 2019

Research Project 2 Master of System and Network Engineering Institute of Informatics University of Amsterdam

slide-2
SLIDE 2

Outline

  • Motivation
  • Growth aspects
  • Legislative developments
  • Related work
  • Research question
  • Model
  • Conclusion
  • Discussion
  • Future work

1

slide-3
SLIDE 3

Introduction

slide-4
SLIDE 4

Motivation (D)DoS & IoT growth

(D)DoS attacks: [5] [4]

  • 1. 620Gbps attack - 20 September 2016 on KrebsOnSecurity.com.
  • 2. 990Gbps attack - 22 September 2016 on hosting provider OVH.
  • 3. 1.2Tbps attack - October 2016 on DNS provider Dyn.
  • 4. 1.3Tbps attack - February 2018 on on Github.
  • 5. 1.7Tbps (alleged) - February 2018, victim undisclosed.

2

slide-5
SLIDE 5

Motivation (D)DoS & IoT growth

(D)DoS attacks: [5] [4]

  • 1. 620Gbps attack - 20 September 2016 on KrebsOnSecurity.com.
  • 2. 990Gbps attack - 22 September 2016 on hosting provider OVH.
  • 3. 1.2Tbps attack - October 2016 on DNS provider Dyn.
  • 4. 1.3Tbps attack - February 2018 on on Github.
  • 5. 1.7Tbps (alleged) - February 2018, victim undisclosed.

IoT growth: [8]

  • 1. 2019 - 14.2 billion ”things” in use.
  • 2. 2021 - 25 billion ”things” in use.
  • 3. 76.05% growth in 2 years.

2

slide-6
SLIDE 6

Legislative (international)

Viktor Vitowsky: [14]

  • 1. Make IoT manufacturers liable based on section 5 from the Federal

Trade Commission (FTC).

  • 2. Businesses damaged by IoT launched DDoS attacks could bring civil

claims. Senator Mark R. Warner asked the Federal Communications Commission (FCC): [15]

  • 1. Internet Service Provider (ISP) policing.
  • 2. Minimum technical security standards defined by the FCC.

3

slide-7
SLIDE 7

Legislative (national)

House of representatives asked the Ministry of Justice and Security: [9]

  • 1. Develop a quality mark or control stamp
  • 2. internet service providers (ISP) and telecommunication companies

have enough capabilities to detect insecure IoT devices.

4

slide-8
SLIDE 8

Research question

How can organisations prevent contributing to Internet of Things denial of service attacks?

5

slide-9
SLIDE 9

Research question

How can organisations prevent contributing to Internet of Things denial of service attacks?

  • 1. Detection methods

5

slide-10
SLIDE 10

Research question

How can organisations prevent contributing to Internet of Things denial of service attacks?

  • 1. Detection methods
  • 2. Prevention methods

5

slide-11
SLIDE 11

Research question

How can organisations prevent contributing to Internet of Things denial of service attacks?

  • 1. Detection methods
  • 2. Prevention methods
  • 3. Minimise contribution

5

slide-12
SLIDE 12

Related Work

  • Muhammad UmarFarooq et al. and Antoine Gallais et al. list

different IoT security attacks [6] [7].

  • Mukrimah Nawir et al. shows the taxonomy of attacks in IoT

environments [12].

  • Elike Hodo et al. uses an artificial neural network to detect threats

in an IoT environment [10].

  • Andria Procopiou et al. developed ”ForChaos” which detects denial
  • f service attacks using forecasting and chaos theory [13].
  • Daniel Jeswin Nallathambi et al. use honeypots to mitigate denial of

service attacks in IoT environments [2]

  • A blockchain mitigation solution is presented by Minhaj Ahmad

Khan et al. [11].

6

slide-13
SLIDE 13

Model

slide-14
SLIDE 14

IoT architecture

Figure 1: IoT architecture (Adapted from: [3][6][1])

7

slide-15
SLIDE 15

IoT defensive layers

Figure 2: IoT defensive layers

8

slide-16
SLIDE 16

Module overview

Figure 3: Module overview

9

slide-17
SLIDE 17

(D)DoS Detection Module (DDM)

slide-18
SLIDE 18

(D)DoS Detection Module (DDM) logic

Figure 4: Detection methods

10

slide-19
SLIDE 19

(D)DoS Detection Module (DDM) logic

Figure 5: Anomaly logic

11

slide-20
SLIDE 20

(D)DoS Detection Module (DDM) logic

Figure 6: Threshold detection

12

slide-21
SLIDE 21

(D)DoS Detection Module (DDM) logic

Figure 7: Signature detection

13

slide-22
SLIDE 22

(D)DoS Detection Module (DDM) logic

Figure 8: Statistic collector

14

slide-23
SLIDE 23

Control Module (CM)

slide-24
SLIDE 24

Control Module (CM) logic

Figure 9: Statistic extractor

15

slide-25
SLIDE 25

Control Module (CM) logic

Figure 10: Threat analyser

16

slide-26
SLIDE 26

Control Module (CM) logic

Figure 11: Lower modules information pass-through

17

slide-27
SLIDE 27

Mitigation Decision Module (MDM)

slide-28
SLIDE 28

Mitigation Decision Module (MDM) logic

Figure 12: Emergency ACL

18

slide-29
SLIDE 29

Mitigation Decision Module (MDM) logic

Figure 13: IoT controller update push check

19

slide-30
SLIDE 30

Mitigation Decision Module (MDM) logic

Figure 14: IoT controller update push check

20

slide-31
SLIDE 31

Mitigation Decision Module (MDM) logic

Figure 15: Reporting implemented mitigation solutions

21

slide-32
SLIDE 32

Mitigation Decision Module (MDM) logic

Figure 16: Reporting lower module information

22

slide-33
SLIDE 33

Update Module (UM)

slide-34
SLIDE 34

UM logic

Figure 17: IoT controller firmware check

23

slide-35
SLIDE 35

Update Module (UM) logic

Figure 18: IoT controller software check

24

slide-36
SLIDE 36

Update Module (UM) logic

Figure 19: IoT controller configuration check

25

slide-37
SLIDE 37

Update Module (UM) logic

Figure 20: IoT controller access control list check

26

slide-38
SLIDE 38

Report Module (RM)

slide-39
SLIDE 39

Report Module (RM) logic

Figure 21: Statistic extractor

27

slide-40
SLIDE 40

Report Module (RM) logic

Figure 22: Maintenance ID reporting and extracting

28

slide-41
SLIDE 41

Asset Management Module (AMM)

slide-42
SLIDE 42

Asset Management Module (AMM) logic

Figure 23: Manufacturers and deployment

29

slide-43
SLIDE 43

Asset Management Module (AMM) logic

Figure 24: Previously in maintenance check

30

slide-44
SLIDE 44

Asset Management Module (AMM) logic

Figure 25: Same error check

31

slide-45
SLIDE 45

Asset Management Module (AMM) logic

Figure 26: Error threshold check

32

slide-46
SLIDE 46

Asset Management Module (AMM) logic

Figure 27: Error threshold check

33

slide-47
SLIDE 47

IoT architecture with added modules

Figure 28: Modules within the IoT architecture

34

slide-48
SLIDE 48

Conclusion, Discussion & Future Work

slide-49
SLIDE 49

Conclusion

How can organisations prevent contributing to Internet of Things denial of service attacks?

35

slide-50
SLIDE 50

Discussion

  • Model applicability dependent on used IoT architecture.
  • Module to device translation.
  • High likely hood of availability (detection and mitigation).
  • Access control list side effects.
  • Layer 3 attributes.
  • External influences effecting the design.

36

slide-51
SLIDE 51

Future Work

  • Proof of concept (measure performance)
  • 1. DDM detection methods
  • 2. DDM traffic sampling rate
  • 3. RM databases
  • 4. CM threat logic
  • Applicable hardware setups
  • Include object defensive layer
  • Threat level matrix guidelines.

37

slide-52
SLIDE 52

References i

Vipindev Adat and BB Gupta. “Security in Internet of Things: issues, challenges, taxonomy, and architecture”. In: Telecommunication Systems 67.3 (2018), pp. 423–441. M Anirudh, S Arul Thileeban, and Daniel Jeswin Nallathambi. “Use

  • f honeypots for mitigating DoS attacks targeted on IoT networks”.

In: 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE. 2017, pp. 1–4. Armir Bujari et al. “Standards, security and business models: key challenges for the IoT scenario”. In: Mobile Networks and Applications 23.1 (2018), pp. 147–154.

38

slide-53
SLIDE 53

References ii

  • Cloudflare. Famous DDoS Attacks — The Largest DDoS Attacks

Of All Time. 2018 (accessed May 12, 2019). url: https://www.cloudflare.com/learning/ddos/famous-ddos- attacks/.

  • enisa. Major DDoS Attacks Involving IoT Devices. 2016 (accessed

May 11, 2019). url: https://www.enisa.europa.eu/publications/info- notes/major-ddos-attacks-involving-iot-devices. Mario Frustaci et al. “Evaluating critical security issues of the IoT world: Present and Future challenges”. In: IEEE Internet of Things Journal 5.4 (2018), pp. 2483–2495. Antoine Gallais et al. “Denial-of-Sleep Attacks against IoT Networks”. In: International Conference on Control, Decision and Information Technologies (CoDIT). 2019.

39

slide-54
SLIDE 54

References iii

  • Gartner. Gartner Identifies Top 10 Strategic IoT Technologies and
  • Trends. 2018 (accessed May 13, 2019). url:

hhttps://www.gartner.com/en/newsroom/press- releases/2018-11-07-gartner-identifies-top-10- strategic-iot-technologies-and-trends. Het bericht ’Agentschap Telecom slaat alarm over hackbare apparaten’. url: https://www.tweedekamer.nl/kamerstukken/kamervragen/ detail?id=2018Z10731&did=2018D32722. Elike Hodo et al. “Threat analysis of IoT networks using artificial neural network intrusion detection system”. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC). IEEE. 2016, pp. 1–6.

40

slide-55
SLIDE 55

References iv

Minhaj Ahmad Khan and Khaled Salah. “IoT security: Review, blockchain solutions, and open challenges”. In: Future Generation Computer Systems 82 (2018), pp. 395–411. Mukrimah Nawir et al. “Internet of Things (IoT): Taxonomy of security attacks”. In: 2016 3rd International Conference on Electronic Design (ICED). IEEE. 2016, pp. 321–326. Andria Procopiou, Nikos Komninos, and Christos Douligeris. “ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network”. In: Wireless Communications and Mobile Computing 2019 (2019). Vincent J. Vitkowsky. “The internet of things: A new era of cyber liability and insurance”. In: (2015).

41

slide-56
SLIDE 56

References v

Mark R. Warner. Sen. Mark Warner Probes Friday;s Crippling Cyber Attack. 2016 (accessed May 14, 2019). url: https://www.warner.senate.gov/public/index.cfm/ pressreleases?ContentRecord_id=CD1BBB25-83E0-494D- B7E1-1C350A7CFCCA.

42

slide-57
SLIDE 57

Questions?

42

slide-58
SLIDE 58

Additional slides: DDM

Figure 29: DDM overview

43

slide-59
SLIDE 59

Additional slides: CM

Figure 30: CM overview

44

slide-60
SLIDE 60

Additional slides: MDM

Figure 31: MDM overview

45

slide-61
SLIDE 61

Additional slides: UM

Figure 32: UM overview

46

slide-62
SLIDE 62

Additional slides: RM

Figure 33: RM overview

47

slide-63
SLIDE 63

Additional slides: AMM

Figure 34: AMM overview

48