Hammoudeh, M, Pimlott, J, Belguith, S, Epiphaniou, G, Baker, T, Kayes, ASM, Adebisi, B and Bounceur, A (2020) Network Traffic Analysis for Threat Detection in the Internet of Things. IEEE Internet of Things Magazine, 3 (4). pp. 40-45. ISSN 2576-3180
|
Text
IoT_Traffic_Analysis.pdf.pdf - Accepted Version Download (1MB) | Preview |
Abstract
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many current solutions available for network monitoring are simply not accessible or can be difficult to implement for the average user and is a gap that needs to be addressed. This paper presents an effective signature-based solution to monitor, analyse and detect potentially malicious traffic for IoT ecosystems in the typical home network environment by utilising passive network sniffing techniques and a cloud-application to monitor anomalous activity. The proposed solution focuses on two attack and propagation vectors leveraged by the infamous Mirai botnet, namely DNS and Telnet. Experimental evaluation demonstrates the proposed solution can detect 98.35% of malicious DNS traffic and 99.33% of Telnet traffic respectively; for an overall detection accuracy of 98.84%.
Item Type: | Article |
---|---|
Additional Information: | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | IEEE |
Date Deposited: | 31 Mar 2020 08:39 |
Last Modified: | 16 Aug 2022 10:15 |
DOI or ID number: | 10.1109/IOTM.0001.2000015 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/12617 |
View Item |