Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Network Traffic Analysis for Threats Detection in the Internet of Things

Hammoudeh, M, Pimlott, J, Belguith, S, Epiphaniou, G, Baker, T, Kayes, ASM, Adebisi, B and Bounceur, A Network Traffic Analysis for Threats Detection in the Internet of Things. IEEE Internet of Things Magazine. ISSN 2576-3180 (Accepted)

[img]
Preview
Text
IoT_Traffic_Analysis.pdf.pdf - Accepted Version

Download (1MB) | Preview

Abstract

As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Whilst users can not be expected to tackle this threat alone, many current solutions available for network monitoring are simply not accessible or can be difficult to implement for the average user and is a gap that needs to be addressed. This paper presents an effective signature-based solution to monitor, analyse and detect potentially malicious traffic for IoT ecosystems in the typical home network environment by utilising passive network sniffing techniques and a cloud-application to monitor anomalous activity. The proposed solution focuses on two attack and propagation vectors leveraged by the infamous Mirai botnet, namely DNS and Telnet. Experimental evaluation demonstrates the proposed solution can detect 98.35% of malicious DNS traffic and 99.33% of Telnet traffic respectively; for an overall detection accuracy of 98.84%.

Item Type: Article
Additional Information: © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 31 Mar 2020 08:39
Last Modified: 31 Mar 2020 08:45
URI: http://researchonline.ljmu.ac.uk/id/eprint/12617

Actions (login required)

View Item View Item