학술논문

PlumeWalk: Towards Threat Provenance Localization for IoT Networks
Document Type
Conference
Source
2019 11th International Conference on Communication Systems & Networks (COMSNETS) Communication Systems & Networks (COMSNETS), 2019 11th International Conference on. :383-390 Jan, 2019
Subject
Communication, Networking and Broadcast Technologies
Security
Computational modeling
Protocols
Internet of Things
Logic gates
Computer worms
Language
ISSN
2155-2509
Abstract
IoT network security is generally viewed from the perspective of a single, or few attack surfaces. A general characterization of attack source threat provenance (origin) under multiple concurrently prevailing attacks can be useful for mitigating origins of attacks and studying the profile of propagating threats.This paper proposes a novel graph theoretic threat provenance identification framework for IoT networks called PlumeWalk. Our framework helps in securing large-sized networks by providing fast and accurate topological characterization of threat provenance as implied by the network traffic, and the network configuration. PlumeWalk is efficiently computable on computationally constrained IoT devices. We simulate attacks on confidentiality, integrity and availability of IoT sensors with different transport reliabilities to evaluate the accuracy and compute time savings of PlumeWalk. We show that PlumeWalk outperforms a measure called “Betweenness Centrality” for flagging threat presence, by using lesser compute time and providing better characterization of attack origin / impact. Finally, we compare PlumeWalk with relevant contemporary solutions for modeling IoT network attack characterization and threat propagation.