Fending off IoT-hunting attacks at home networks

  • Vincentius Martin
  • , Qiang Cao
  • , Theophilus Benson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

22 Scopus citations

Abstract

Many attacks target vulnerabilities of home IoT devices, such as bugs in outdated software and weak passwords. The home network is at a vantage point for deploying security appliances to deal with such IoT attacks. We propose a comprehensive home network defense, Pot2DPI, and use it to raise an attacker’s uncertainty about devices and enable the home network to monitor traffic, detect anomalies, and filter malicious packets. The security offered by Pot2DPI comes from a synthesis of practical techniques: honeypot, deep packet inspection (DPI), and a realization of moving target defense (MTD) in port forwarding. In particular, Pot2DPI has a chain of honeypot and DPI that collects suspicious packet traces, acquires attack signatures, and installs filtering rules at a home router timely. Meanwhile, Pot2DPI shuffles the mapping of ports between the router and the devices connected to it, making a targeted attack difficult and defense more effective. Pot2DPI is our first step towards securing a smart home.

Original languageEnglish
Title of host publicationCAN 2017 - Proceedings of the 2017 Cloud-Assisted Networking Workshop, Part of CoNext 2017
PublisherAssociation for Computing Machinery, Inc
Pages67-72
Number of pages6
ISBN (Electronic)9781450354233
DOIs
StatePublished - 11 Dec 2017
Externally publishedYes
Event2nd Cloud-Assisted Networking Workshop, CAN 2017 - Incheon, Korea, Republic of
Duration: 12 Dec 201712 Dec 2017

Publication series

NameCAN 2017 - Proceedings of the 2017 Cloud-Assisted Networking Workshop, Part of CoNext 2017

Conference

Conference2nd Cloud-Assisted Networking Workshop, CAN 2017
Country/TerritoryKorea, Republic of
CityIncheon
Period12/12/1712/12/17

Keywords

  • Home network
  • Honeypot
  • IoT
  • Moving target defense

Fingerprint

Dive into the research topics of 'Fending off IoT-hunting attacks at home networks'. Together they form a unique fingerprint.

Cite this