SlideShare a Scribd company logo
Lightweight Distributed Attack
Detection and Prevention for the Safe
Internet of Things
Vladimir Eliseev, JSC InfoTeCS; Olga Eliseeva, MSTU
CYBER SECURITY 2018
Scotland
JUNE 11-12, 2018
©2018, ОАО «ИнфоТеКС».
IoT Security Facts
Incidents with IoT:
• More than 73000 Internet-
connected cameras with default
password (Nov 2014)
• Mirai botnet (Sep 2016 and later)
• Leet botnet (Dec 2016)
• Amnesia botnet (Apr 2017)
• Brickerbot botnet (Apr 2017)
• Millions of CPE with known
vulnerabilities (2017-2018)
Botnet features:
• Contains of many typically
infected similar devices
• Coexist with normal functions
of infected devices (except for
Brickerbot)
• Traffic up to 1.1Tbps and more
than 100Mpps
• Both amplification and flood
attack techniques
• Both runtime and persistent
presence in infected system
• Cheap Attack-as-a-Service: $20
per target (290-300Gbps)
11-12.06.2018 2
©2018, ОАО «ИнфоТеКС».
How to infect a Smart Thing?
How to protect it?
Infection/illegal use:
• Weak and default passwords
• Exploits to unpatched firmware
• Well-known weakness of popular
protocols (UPnP, SSDP, DNS etc)
Protection by a manufacturer:
• Less bugs and frequent firmware
updates
• Force user to be accurate with
security settings
Protection by an owner:
• Be professional and care of security
11-12.06.2018 3
IoT Device
Owner and
Legal User
IoT Device
IoT Device
Manufacturer
1. Setup connection
2. Setup password
3. Configure
4. Maintenance
1. Initial firmware
2. Setup scenario
3. Default
configuration and
password
4. Updates of
firmware
©2018, ОАО «ИнфоТеКС».
The roots of IoT security
problems
Characteristics:
• Target user for IoT devices is a customer without IT knowledge. The more
simple the better!
• Firmware security updates are usually not supplied by a vendor after the
model got off the market
• Security is not an important function for IoT. All security features are too
deep inside and no one knows are they really present or not
• The basis of any IoT device is a typical computer architecture with well
known OS, software, bugs and vulnerabilities – familiar for hackers
• There is no capability to install addon protection software like on PC or
Mobile
11-12.06.2018 4
©2018, ОАО «ИнфоТеКС».
Anatomy of the IoT botnet
attack and its prevention
• After infection and loading
malicious modules all devices
which belong to the botnet are
ready to execute attacking
actions: flood or amplify
• Attack starts with an order from
botnet C&C center, controlled
by the botnet owner
• Channel to the C&C center is
often encrypted by TLS/SSL
• Numerous IoT devices begin to
generate junk traffic, targeted
to the victim Internet resource
11-12.06.2018 5
IoT Device
Internet
Botnet
owner
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
Target of
Attack
Detect and
prevent receiving
an attack order
Filter out junk
traffic
©2018, ОАО «ИнфоТеКС».
IoT: Intrusion detection and
prevention considerations
Why not to use IDPS to protect IoT
device from infection?
• No defense infrastructure in place of
typical IoT device Internet connection
• Defense infrastructure is too expensive
to be used for numerous and cheap IoT
devices in every place of their
connection
Why not to integrate IDPS into the IoT
device?
• High False Positive rate for fully
automated IDPS solutions
• Needs frequent update of a large
database with attack signatures and
prevention rules
• Too modest resources of IoT’s computer
platform does not allow to run IDPS
11-12.06.2018 6
Source of
Attack
Target of
Attack
Internet
Firewall
IDS
SOC
©2018, ОАО «ИнфоТеКС».
DDoS attack from the IoT botnet
Popular attacks:
• SYN, UDP, ICMP flood
• IP fragmentation
• NTP, DNS amplification
• HTTP flood (application layer attack)
Difficulties to filter junk traffic:
• Botnet member IoT devices are behind
DNAT
• Application layer attack looks like
normal traffic
• Power of an attack is very high due to
large number of IoT devices in a botnet
11-12.06.2018 7
Internet
Target of
Attack
Defense infrastructure
©2018, ОАО «ИнфоТеКС».
BUT!
The background of an idea
Nobody cares about IoT device’s security:
• The device works good most of the time even if it belongs to some botnet
• An user is a dummy (to configure and to service the device properly)
• A vendor is greedy (to release security updates and to develop security proven firmware)
Main problems:
• IoT devices become very dangerous when they are captured into a botnet
• To fight with IoT botnet attacks is much more expensive than to conduct them
• Junk traffic from IoT botnet may flood not only customer resources, ISP infrastructure as
well
11-12.06.2018 8
…so, we need to protect the Internet from infected IoT devices
©2018, ОАО «ИнфоТеКС».
Useful considerations and an idea
11-12.06.2018 9
Malicious use of IoT device in a botnet:
• Different ports and protocols
• Different statistics of network traffic
• Different CPU and memory compuption
Application:
• The normal behavior may be recognized by
one-class classifier
• This classifier should be the only for all
devices with the same firmware
• The anomaly should mean the malicious
use of the IoT device
IoT device specifics:
• Fixed functionality for the entire lifetime
• Identity of devices of the same model –
they differ only by the serial number
• Limited and very specific functionality
Ergo:
It’s possible to describe the normal behavior of
the IoT device in terms of measured
parameters:
• Network ports and protocols
• Network traffic statistics
• Directions of the network traffic
• CPU and memory consumption
• Etc
IoT device can provide information about self
anomaly behavior
©2018, ОАО «ИнфоТеКС».
Safe IoT device architecture
The classifier should be developed together with the
firmware of the IoT device
Agent-whistleblower (Agent WB) is a program which
includes the classifier and the anomaly signal provider
Proposed scenario:
1. Consider the IoT device was attacked successfully
(never mind which way of penetration were used –
password bruteforce, code injection etc)
2. The IoT device had become infected by some Botnet
Agent software, used to make DDoS attack
3. If the IoT device starts to generate some attacking and
highly likely unusual traffic, Agent WB will detect the
anomaly and sends a corresponding signal
11-12.06.2018 10
InternetInternet
©2018, ОАО «ИнфоТеКС».
Internet Service Provider (ISP)
infrastructure to prevent DDoS attack
11-12.06.2018 11
Internet
Positions:
• IoT devices connects to the Internet via some ISP
• ISP can see anomaly signals (if any) from IoT devices
• Threat Intelligence modules of ISP can correlate anomaly signals
• Anomaly signal discloses the address of the IoT device from which it
origins
DDoS attack case:
• Many correlated anomaly signals at the same time mean DDoS attack
activity
• All source IP-addresses of attacking IoT devices are disclosed by
anomaly signals
• Filter rules for the firewall can be generated automatically
• As a result, DDoS attack from this ISP will be prevents near its source
Normal case:
• No anomaly signals then firewall is open for the traffic
• Some anomaly signals appears but they are not highly correlated then
firewall is open for the traffic also (False Positive case)
©2018, ОАО «ИнфоТеКС».
Discussion and conclusion
11-12.06.2018 12
Agent WB and classifier technology:
• The classifier may use machine learning or other
techniques
• A vendor should provide classifier for the one version
of firmware only once
• An authenticity of anomaly signal should be
guaranteed
• Agent WB may use trusted platform mechanisms to
protect itself from an adversary
Conclusion:
• An analysis of IoT secuirty problems was performed
• A novel approach of safe IoT device was represented
• An architecture of the safe IoT device and appropriate
ISP infrastructure was proposed
Regulation:
• IoT device vendors should be motivated to include
Agent WB in their products
• ISP should have infrastructure to understand anomaly
signals of any IoT device of any vendor
• An international standardization of Agent WB anomaly
signal protocol should help
• National interests are taken into account because
anomaly signals are processed in national borders
Discussion:
• IoT devices will become more safe for the Internet
• IoT devices will be still vulnerable and unprotected
• Zero-day vulnerability in IoT device firmware will not
break the proposed technology
• But if an adversary will turn off Agent WB or will
generate fake anomaly signals, it should be a problem
• Weak DDoS attacks may still appear if the threshold of
the TI module is relatively high
Thank you for attention!

More Related Content

PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
IoT/M2M Security
PPTX
Presentation on IOT SECURITY
PPTX
IoT security
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PPTX
Security Testing for IoT Systems
PPTX
Iot Security, Internet of Things
PPTX
Internet of things security "Hardware Security"
Ryan Wilson - ryanwilson.com - IoT Security
IoT/M2M Security
Presentation on IOT SECURITY
IoT security
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Security Testing for IoT Systems
Iot Security, Internet of Things
Internet of things security "Hardware Security"

What's hot (20)

PPTX
Iot Security
PPTX
Iot security amar prusty
PDF
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
PPTX
Security for iot and cloud aug 25b 2017
PDF
IOT Security
PDF
IoT Security in Action - Boston Sept 2015
PPTX
Privacy and security in IoT
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
IoT Security Challenges
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Introduction to IOT security
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
IoT Security Challenges and Solutions
PPTX
IoT security compliance checklist
PPTX
Iot(security)
PDF
Bolstering the security of iiot applications – how to go about it
PPT
IoT Security by Sanjay Kumar
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
IoT Security Training, IoT Security Awareness 2019
Iot Security
Iot security amar prusty
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
Security for iot and cloud aug 25b 2017
IOT Security
IoT Security in Action - Boston Sept 2015
Privacy and security in IoT
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT Security Challenges
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Introduction to IOT security
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT Security Challenges and Solutions
IoT security compliance checklist
Iot(security)
Bolstering the security of iiot applications – how to go about it
IoT Security by Sanjay Kumar
IoT Security Briefing FBI 07 23-2017 final
IoT Security Training, IoT Security Awareness 2019
Ad

Similar to Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things (20)

PDF
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
PDF
IoT Security, Mirai Revisited
PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
DOCX
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
Assign 1_8812814ctm.pptx
PDF
Internet of Things - Privacy and Security issues
PDF
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
PDF
Avast @ Machine Learning
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
beware of Thing Bot
PDF
IoT Network Attack Detection using Supervised Machine Learning
PDF
The bad, the ugly and the weird about IoT
PPTX
IoT and the industrial Internet of Things - june 20 2019
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
PDF
Arbor Presentation
PPTX
A Wake-Up Call for IoT
PDF
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
PPTX
IoT DDoS Attacks: the stakes have changed
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
IoT Security, Mirai Revisited
Detecting and Confronting Flash Attacks from IoT Botnets
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
October 2021: Top 10 Read Articles in Network Security and Its Applications
Assign 1_8812814ctm.pptx
Internet of Things - Privacy and Security issues
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
Avast @ Machine Learning
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
beware of Thing Bot
IoT Network Attack Detection using Supervised Machine Learning
The bad, the ugly and the weird about IoT
IoT and the industrial Internet of Things - june 20 2019
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
Arbor Presentation
A Wake-Up Call for IoT
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IoT DDoS Attacks: the stakes have changed
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
Ad

Recently uploaded (20)

PDF
MIRIDeepImagingSurvey(MIDIS)oftheHubbleUltraDeepField
PPTX
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
PPTX
2. Earth - The Living Planet earth and life
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PPT
Chemical bonding and molecular structure
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PDF
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PPTX
famous lake in india and its disturibution and importance
PDF
diccionario toefl examen de ingles para principiante
PDF
Sciences of Europe No 170 (2025)
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
MIRIDeepImagingSurvey(MIDIS)oftheHubbleUltraDeepField
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
2. Earth - The Living Planet earth and life
AlphaEarth Foundations and the Satellite Embedding dataset
Introduction to Fisheries Biotechnology_Lesson 1.pptx
Chemical bonding and molecular structure
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
Comparative Structure of Integument in Vertebrates.pptx
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
cpcsea ppt.pptxssssssssssssssjjdjdndndddd
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
Taita Taveta Laboratory Technician Workshop Presentation.pptx
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
famous lake in india and its disturibution and importance
diccionario toefl examen de ingles para principiante
Sciences of Europe No 170 (2025)
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS

Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things

  • 1. Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things Vladimir Eliseev, JSC InfoTeCS; Olga Eliseeva, MSTU CYBER SECURITY 2018 Scotland JUNE 11-12, 2018
  • 2. ©2018, ОАО «ИнфоТеКС». IoT Security Facts Incidents with IoT: • More than 73000 Internet- connected cameras with default password (Nov 2014) • Mirai botnet (Sep 2016 and later) • Leet botnet (Dec 2016) • Amnesia botnet (Apr 2017) • Brickerbot botnet (Apr 2017) • Millions of CPE with known vulnerabilities (2017-2018) Botnet features: • Contains of many typically infected similar devices • Coexist with normal functions of infected devices (except for Brickerbot) • Traffic up to 1.1Tbps and more than 100Mpps • Both amplification and flood attack techniques • Both runtime and persistent presence in infected system • Cheap Attack-as-a-Service: $20 per target (290-300Gbps) 11-12.06.2018 2
  • 3. ©2018, ОАО «ИнфоТеКС». How to infect a Smart Thing? How to protect it? Infection/illegal use: • Weak and default passwords • Exploits to unpatched firmware • Well-known weakness of popular protocols (UPnP, SSDP, DNS etc) Protection by a manufacturer: • Less bugs and frequent firmware updates • Force user to be accurate with security settings Protection by an owner: • Be professional and care of security 11-12.06.2018 3 IoT Device Owner and Legal User IoT Device IoT Device Manufacturer 1. Setup connection 2. Setup password 3. Configure 4. Maintenance 1. Initial firmware 2. Setup scenario 3. Default configuration and password 4. Updates of firmware
  • 4. ©2018, ОАО «ИнфоТеКС». The roots of IoT security problems Characteristics: • Target user for IoT devices is a customer without IT knowledge. The more simple the better! • Firmware security updates are usually not supplied by a vendor after the model got off the market • Security is not an important function for IoT. All security features are too deep inside and no one knows are they really present or not • The basis of any IoT device is a typical computer architecture with well known OS, software, bugs and vulnerabilities – familiar for hackers • There is no capability to install addon protection software like on PC or Mobile 11-12.06.2018 4
  • 5. ©2018, ОАО «ИнфоТеКС». Anatomy of the IoT botnet attack and its prevention • After infection and loading malicious modules all devices which belong to the botnet are ready to execute attacking actions: flood or amplify • Attack starts with an order from botnet C&C center, controlled by the botnet owner • Channel to the C&C center is often encrypted by TLS/SSL • Numerous IoT devices begin to generate junk traffic, targeted to the victim Internet resource 11-12.06.2018 5 IoT Device Internet Botnet owner IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device Target of Attack Detect and prevent receiving an attack order Filter out junk traffic
  • 6. ©2018, ОАО «ИнфоТеКС». IoT: Intrusion detection and prevention considerations Why not to use IDPS to protect IoT device from infection? • No defense infrastructure in place of typical IoT device Internet connection • Defense infrastructure is too expensive to be used for numerous and cheap IoT devices in every place of their connection Why not to integrate IDPS into the IoT device? • High False Positive rate for fully automated IDPS solutions • Needs frequent update of a large database with attack signatures and prevention rules • Too modest resources of IoT’s computer platform does not allow to run IDPS 11-12.06.2018 6 Source of Attack Target of Attack Internet Firewall IDS SOC
  • 7. ©2018, ОАО «ИнфоТеКС». DDoS attack from the IoT botnet Popular attacks: • SYN, UDP, ICMP flood • IP fragmentation • NTP, DNS amplification • HTTP flood (application layer attack) Difficulties to filter junk traffic: • Botnet member IoT devices are behind DNAT • Application layer attack looks like normal traffic • Power of an attack is very high due to large number of IoT devices in a botnet 11-12.06.2018 7 Internet Target of Attack Defense infrastructure
  • 8. ©2018, ОАО «ИнфоТеКС». BUT! The background of an idea Nobody cares about IoT device’s security: • The device works good most of the time even if it belongs to some botnet • An user is a dummy (to configure and to service the device properly) • A vendor is greedy (to release security updates and to develop security proven firmware) Main problems: • IoT devices become very dangerous when they are captured into a botnet • To fight with IoT botnet attacks is much more expensive than to conduct them • Junk traffic from IoT botnet may flood not only customer resources, ISP infrastructure as well 11-12.06.2018 8 …so, we need to protect the Internet from infected IoT devices
  • 9. ©2018, ОАО «ИнфоТеКС». Useful considerations and an idea 11-12.06.2018 9 Malicious use of IoT device in a botnet: • Different ports and protocols • Different statistics of network traffic • Different CPU and memory compuption Application: • The normal behavior may be recognized by one-class classifier • This classifier should be the only for all devices with the same firmware • The anomaly should mean the malicious use of the IoT device IoT device specifics: • Fixed functionality for the entire lifetime • Identity of devices of the same model – they differ only by the serial number • Limited and very specific functionality Ergo: It’s possible to describe the normal behavior of the IoT device in terms of measured parameters: • Network ports and protocols • Network traffic statistics • Directions of the network traffic • CPU and memory consumption • Etc IoT device can provide information about self anomaly behavior
  • 10. ©2018, ОАО «ИнфоТеКС». Safe IoT device architecture The classifier should be developed together with the firmware of the IoT device Agent-whistleblower (Agent WB) is a program which includes the classifier and the anomaly signal provider Proposed scenario: 1. Consider the IoT device was attacked successfully (never mind which way of penetration were used – password bruteforce, code injection etc) 2. The IoT device had become infected by some Botnet Agent software, used to make DDoS attack 3. If the IoT device starts to generate some attacking and highly likely unusual traffic, Agent WB will detect the anomaly and sends a corresponding signal 11-12.06.2018 10 InternetInternet
  • 11. ©2018, ОАО «ИнфоТеКС». Internet Service Provider (ISP) infrastructure to prevent DDoS attack 11-12.06.2018 11 Internet Positions: • IoT devices connects to the Internet via some ISP • ISP can see anomaly signals (if any) from IoT devices • Threat Intelligence modules of ISP can correlate anomaly signals • Anomaly signal discloses the address of the IoT device from which it origins DDoS attack case: • Many correlated anomaly signals at the same time mean DDoS attack activity • All source IP-addresses of attacking IoT devices are disclosed by anomaly signals • Filter rules for the firewall can be generated automatically • As a result, DDoS attack from this ISP will be prevents near its source Normal case: • No anomaly signals then firewall is open for the traffic • Some anomaly signals appears but they are not highly correlated then firewall is open for the traffic also (False Positive case)
  • 12. ©2018, ОАО «ИнфоТеКС». Discussion and conclusion 11-12.06.2018 12 Agent WB and classifier technology: • The classifier may use machine learning or other techniques • A vendor should provide classifier for the one version of firmware only once • An authenticity of anomaly signal should be guaranteed • Agent WB may use trusted platform mechanisms to protect itself from an adversary Conclusion: • An analysis of IoT secuirty problems was performed • A novel approach of safe IoT device was represented • An architecture of the safe IoT device and appropriate ISP infrastructure was proposed Regulation: • IoT device vendors should be motivated to include Agent WB in their products • ISP should have infrastructure to understand anomaly signals of any IoT device of any vendor • An international standardization of Agent WB anomaly signal protocol should help • National interests are taken into account because anomaly signals are processed in national borders Discussion: • IoT devices will become more safe for the Internet • IoT devices will be still vulnerable and unprotected • Zero-day vulnerability in IoT device firmware will not break the proposed technology • But if an adversary will turn off Agent WB or will generate fake anomaly signals, it should be a problem • Weak DDoS attacks may still appear if the threshold of the TI module is relatively high Thank you for attention!