SlideShare a Scribd company logo
Smart Attacks on the integrity
of the Internet of Things
Avoiding detection by employing Game Theory
George Margelis Robert J. Piechocki, Theo Tryfonas, Paul Thomas
IEEE GLOBECOM - 7 December 2016
Presentation Outline
• Problem Statement
• Model
• Assumptions and Definitions
• Game Theory aspects
• Numerical Simulation results
• Conclusions
The Internet of Things
Smart
Metering
Home
Automation
Smart
Agriculture
Transportation
Infrastructure
Monitoring
Smart
Metering
e-Health
Industrial
Enterprise
ζ
V2x
The
Internet
Of Things
The Internet of Things
• The IoT will connect different
domains into one
homogenous network
• Different domains →
different requirements
• However all domains share
one requirement:
Robust
Security
Inherent Uncertainty
Cheap Nodes → Cheap Sensors → Limited Precision
Limited precision → Measurement Uncertainty
“Weird” behaviour: Is a node malicious?
Or simply malfunctioning?
Are a group of nodes whose values deviate
from the mean compromised?
Or simply they are the first to sense
a change in the measured values?
Detecting Malicious Nodes
Traditional approach:
Outlier detection and intrusion detection schemes.
However, modern penetration techniques are smarter:
Infecting but remaining in stealth, without changing node
behaviour.
Also when the majority of the nodes have been infected, the
outliers are the healthy ones.
Attackers are exploiting the characteristics of the IoT with
smarter penetration strategies.
Detecting Malicious Nodes
Detecting Malicious Nodes
Detecting Malicious Nodes
Defining a Smart Attacker
• Can compromise healthy nodes
• Avoids changing node behaviour radically
• Exploits the inherent uncertainty in the
measurements
Defining a Smart Attacker
Assumptions regarding the Attacker:
• The attacker can see the final extracted value.
• Every attack that the attacker attempts is successful,
leading to a compromised node.
• The attacker attempts to change the reported value to
something else, which we name ”Attacker’s Target”.
• The attacker controls the number of compromised
nodes(A) and how much the value of the compromised
nodes differs compared to the measured value (lj ).
Defining a Smart Attacker
Assumptions regarding the network:
• Similar to Low Throughtput Networks like LoRA or Sigfox.
• Nodes communicate a measured value (either in a
scheduled or opportunistic manner).
• The mean of the distribution of the values of the network
is the extracted value.
Attacker’s Dilemma
Distance metrics
Kullback – Leibler Divergence 𝐷 𝐾𝐿(𝑃| 𝑄 =
𝑖
𝑃 𝑖 𝑙𝑜𝑔
𝑃(𝑖)
𝑄(𝑖)
Euclidean Distance 𝐷 𝑃, 𝑄 =
𝑖=1
𝑛
(𝑄 𝑖 − 𝑃 𝑖 2
Hellinger’s Distance 𝐷 𝑃, 𝑄 = −𝑙𝑛 𝑃 𝑖 𝑄(𝑖)
Applying Game Theory
A game in it’s normal form is a tuple 𝐺 = 𝑁, 𝐴, 𝑢 , where:
• 𝑁 = {1,2, … , 𝑛𝑖}a set of n rational players. By rational in this
context we mean that the player chooses the strategy that
maximizes his payoff.
• 𝐴 = 𝐴1 × ⋯ × 𝐴2, where 𝐴𝑖 the finite set of actions available to
player 𝑖
• 𝑢 = 𝑢1, … , 𝑢 𝑛 where 𝑢𝑖: 𝐴 → ℝ, a real-valued payoff function
for player 𝑖
Applying Game Theory
Utility Function
Reported
Value
Attacker’s
Target
Compromised
Nodes Cost of
Attack
Hellinger’s Distance
From model distribution
Hellinger’s Distance
Detection Threshold
Reward
𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
Applying Game Theory
Utility Function
𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
𝑖=1
N−A
𝑥𝑖 + 𝑗=1
A
(𝑥 𝑗+𝑙𝑗)
𝑖=1
N
𝑥𝑖
𝜇 ≥ 𝐴𝑇 =
1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 =
1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Scenarios and results
Scenario 1: Cost of attack remains constant as number of attacks is increased
Scenario 2: Cost of attack rises as number of attacks is increased
Scenario 3: Cost of attack reduces as number of attacks is increased
Scenarios and results
Pay-out for the attacker for the first scenario when the
attacker aims to shift the mean of the distribution 1% higher
Scenarios and results
Pay-out for the attacker for the second scenario when the
attacker aims to shift the mean of the distribution 5% higher
Scenarios and results
Pay-out for the attacker for the third scenario when the
attacker aims to shift the mean of the distribution 1% higher
Scenarios and results
Scenarios and results
Percentage of Nodes needed to be compromised vs.
Threshold for the attacker to win the first scenario.
Scenarios and results
Percentage of Nodes needed to be compromised vs.
Threshold for the discounted game.
False positive Rate
𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑅𝑎𝑡𝑒 =
𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
𝑇𝑟𝑢𝑒 𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒𝑠+𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
Conclusions
• The uncertainty inherent in the measurements can
be exploited by smart attackers.
• Outlier detection based IDS might not be enough in
light of smart-deployment strategies of malware.
• Distribution comparison can provide insights for
potential penetrations with low complexity costs.
• However the attackers can still compromise the
integrity of the network if they set modest targets.
Thank you
Questions?

More Related Content

PDF
Challenge@RuleML2015 Assessing elements of crime based on an agent simulation...
PPTX
Stat451 - Life Distribution
PPTX
Mc (1)
PDF
529 199-206
PPTX
Application of machine learning and cognitive computing in intrusion detectio...
PDF
Using Machine Learning in Networks Intrusion Detection Systems
PPTX
When Cyber Security Meets Machine Learning
PPTX
Intrusion Prevention System
Challenge@RuleML2015 Assessing elements of crime based on an agent simulation...
Stat451 - Life Distribution
Mc (1)
529 199-206
Application of machine learning and cognitive computing in intrusion detectio...
Using Machine Learning in Networks Intrusion Detection Systems
When Cyber Security Meets Machine Learning
Intrusion Prevention System

Viewers also liked (13)

PPTX
Intrusion detection system
PPTX
Intrusion detection system
PPTX
Intrusion detection and prevention system
PDF
IOT & Machine Learning
PPTX
Internet of Things
PPT
Intrusion detection system ppt
PDF
What exactly is the "Internet of Things"?
PDF
What is the Internet of Things?
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PDF
Introduction to IOT & Smart City
PPT
Internet of Things and its applications
PPTX
IoT - IT 423 ppt
PDF
Internet of Things
Intrusion detection system
Intrusion detection system
Intrusion detection and prevention system
IOT & Machine Learning
Internet of Things
Intrusion detection system ppt
What exactly is the "Internet of Things"?
What is the Internet of Things?
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Introduction to IOT & Smart City
Internet of Things and its applications
IoT - IT 423 ppt
Internet of Things
Ad

Similar to Smart Attacks on the integrity of the Internet of Things Avoiding detection by employing Game Theory (20)

PDF
Cyber_Attack_Forecasting_Jones_2015
PDF
Cerutti-AT2013-Trust and Risk
PDF
Why do Nigerian Scammers Say They are from Nigeria?
PDF
Gamesec23 - Scalable Learning of Intrusion Response through Recursive Decompo...
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
DOCX
· QuantitativeQuantitative vs. Qualitative Analysis Assignment.docx
PDF
Kb2417221726
PDF
Safeguard the Automatic Generation Control using Game Theory Technique
PDF
Probabilistic models for anomaly detection based on usage of network traffic
DOCX
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
PDF
Poster
PDF
Enhancing intrusion detection in next-generation networks based on a multi-ag...
PDF
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PDF
Predictive cyber security
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
Risk Assessment for Identifying Intrusion in Manet
PDF
PPTX
Optimizing honeypot strategies against dynamic lateral movement using partial...
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PDF
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Cyber_Attack_Forecasting_Jones_2015
Cerutti-AT2013-Trust and Risk
Why do Nigerian Scammers Say They are from Nigeria?
Gamesec23 - Scalable Learning of Intrusion Response through Recursive Decompo...
“AI techniques in cyber-security applications”. Flammini lnu susec19
· QuantitativeQuantitative vs. Qualitative Analysis Assignment.docx
Kb2417221726
Safeguard the Automatic Generation Control using Game Theory Technique
Probabilistic models for anomaly detection based on usage of network traffic
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
Poster
Enhancing intrusion detection in next-generation networks based on a multi-ag...
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
Predictive cyber security
A wireless intrusion detection system and a new attack model (synopsis)
Risk Assessment for Identifying Intrusion in Manet
Optimizing honeypot strategies against dynamic lateral movement using partial...
Optimized Intrusion Detection System using Deep Learning Algorithm
Monitoring Smart Grid Operations and Maintaining Missions Assurance
Ad

More from Communication Systems & Networks (19)

PDF
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
PDF
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
PDF
Measurements and Characterization of Surface Scattering at 60GHz
PDF
Millimetre Wave Channel Measurements in a Railway Depot
PDF
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
PDF
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
PPTX
LTE-A Virtual Drive Testing for Vehicular Environments
PPTX
Analysis of Measured LOS Massive MIMO Channels with Mobility
PDF
Bristol Uni posters Brooklyn 5G Summit April 2017
PDF
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
PDF
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
PPTX
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
PPTX
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
PPTX
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
PDF
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
PPTX
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
PPTX
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
PPTX
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
PPTX
Performance evaluation of multicast video distribution using lte a in vehicul...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Measurements and Characterization of Surface Scattering at 60GHz
Millimetre Wave Channel Measurements in a Railway Depot
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
LTE-A Virtual Drive Testing for Vehicular Environments
Analysis of Measured LOS Massive MIMO Channels with Mobility
Bristol Uni posters Brooklyn 5G Summit April 2017
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
Performance evaluation of multicast video distribution using lte a in vehicul...

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PDF
composite construction of structures.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PPT on Performance Review to get promotions
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Well-logging-methods_new................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
composite construction of structures.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
R24 SURVEYING LAB MANUAL for civil enggi
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Digital Logic Computer Design lecture notes
CH1 Production IntroductoryConcepts.pptx
Foundation to blockchain - A guide to Blockchain Tech
PPT on Performance Review to get promotions
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Well-logging-methods_new................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
OOP with Java - Java Introduction (Basics)

Smart Attacks on the integrity of the Internet of Things Avoiding detection by employing Game Theory

  • 1. Smart Attacks on the integrity of the Internet of Things Avoiding detection by employing Game Theory George Margelis Robert J. Piechocki, Theo Tryfonas, Paul Thomas IEEE GLOBECOM - 7 December 2016
  • 2. Presentation Outline • Problem Statement • Model • Assumptions and Definitions • Game Theory aspects • Numerical Simulation results • Conclusions
  • 3. The Internet of Things Smart Metering Home Automation Smart Agriculture Transportation Infrastructure Monitoring Smart Metering e-Health Industrial Enterprise ζ V2x The Internet Of Things
  • 4. The Internet of Things • The IoT will connect different domains into one homogenous network • Different domains → different requirements • However all domains share one requirement: Robust Security
  • 5. Inherent Uncertainty Cheap Nodes → Cheap Sensors → Limited Precision Limited precision → Measurement Uncertainty “Weird” behaviour: Is a node malicious? Or simply malfunctioning? Are a group of nodes whose values deviate from the mean compromised? Or simply they are the first to sense a change in the measured values?
  • 6. Detecting Malicious Nodes Traditional approach: Outlier detection and intrusion detection schemes. However, modern penetration techniques are smarter: Infecting but remaining in stealth, without changing node behaviour. Also when the majority of the nodes have been infected, the outliers are the healthy ones. Attackers are exploiting the characteristics of the IoT with smarter penetration strategies.
  • 10. Defining a Smart Attacker • Can compromise healthy nodes • Avoids changing node behaviour radically • Exploits the inherent uncertainty in the measurements
  • 11. Defining a Smart Attacker Assumptions regarding the Attacker: • The attacker can see the final extracted value. • Every attack that the attacker attempts is successful, leading to a compromised node. • The attacker attempts to change the reported value to something else, which we name ”Attacker’s Target”. • The attacker controls the number of compromised nodes(A) and how much the value of the compromised nodes differs compared to the measured value (lj ).
  • 12. Defining a Smart Attacker Assumptions regarding the network: • Similar to Low Throughtput Networks like LoRA or Sigfox. • Nodes communicate a measured value (either in a scheduled or opportunistic manner). • The mean of the distribution of the values of the network is the extracted value.
  • 14. Distance metrics Kullback – Leibler Divergence 𝐷 𝐾𝐿(𝑃| 𝑄 = 𝑖 𝑃 𝑖 𝑙𝑜𝑔 𝑃(𝑖) 𝑄(𝑖) Euclidean Distance 𝐷 𝑃, 𝑄 = 𝑖=1 𝑛 (𝑄 𝑖 − 𝑃 𝑖 2 Hellinger’s Distance 𝐷 𝑃, 𝑄 = −𝑙𝑛 𝑃 𝑖 𝑄(𝑖)
  • 15. Applying Game Theory A game in it’s normal form is a tuple 𝐺 = 𝑁, 𝐴, 𝑢 , where: • 𝑁 = {1,2, … , 𝑛𝑖}a set of n rational players. By rational in this context we mean that the player chooses the strategy that maximizes his payoff. • 𝐴 = 𝐴1 × ⋯ × 𝐴2, where 𝐴𝑖 the finite set of actions available to player 𝑖 • 𝑢 = 𝑢1, … , 𝑢 𝑛 where 𝑢𝑖: 𝐴 → ℝ, a real-valued payoff function for player 𝑖
  • 16. Applying Game Theory Utility Function Reported Value Attacker’s Target Compromised Nodes Cost of Attack Hellinger’s Distance From model distribution Hellinger’s Distance Detection Threshold Reward 𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷)
  • 17. Applying Game Theory Utility Function 𝐴𝑃 = 𝜇 ≥ 𝐴𝑇 ∙ 𝑅𝑊𝐷 − 𝐴 ∙ 𝐶𝑃𝐴 − 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 ∙ 2 ∙ (𝑅𝑊𝐷) 𝑖=1 N−A 𝑥𝑖 + 𝑗=1 A (𝑥 𝑗+𝑙𝑗) 𝑖=1 N 𝑥𝑖 𝜇 ≥ 𝐴𝑇 = 1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠 0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 𝐷(𝑃,𝑄) > 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 1, 𝑖𝑓 𝑖𝑛𝑒𝑞𝑢𝑎𝑙𝑖𝑡𝑦 ℎ𝑜𝑙𝑑𝑠 0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
  • 18. Scenarios and results Scenario 1: Cost of attack remains constant as number of attacks is increased Scenario 2: Cost of attack rises as number of attacks is increased Scenario 3: Cost of attack reduces as number of attacks is increased
  • 19. Scenarios and results Pay-out for the attacker for the first scenario when the attacker aims to shift the mean of the distribution 1% higher
  • 20. Scenarios and results Pay-out for the attacker for the second scenario when the attacker aims to shift the mean of the distribution 5% higher
  • 21. Scenarios and results Pay-out for the attacker for the third scenario when the attacker aims to shift the mean of the distribution 1% higher
  • 23. Scenarios and results Percentage of Nodes needed to be compromised vs. Threshold for the attacker to win the first scenario.
  • 24. Scenarios and results Percentage of Nodes needed to be compromised vs. Threshold for the discounted game.
  • 25. False positive Rate 𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑅𝑎𝑡𝑒 = 𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠 𝑇𝑟𝑢𝑒 𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒𝑠+𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒𝑠
  • 26. Conclusions • The uncertainty inherent in the measurements can be exploited by smart attackers. • Outlier detection based IDS might not be enough in light of smart-deployment strategies of malware. • Distribution comparison can provide insights for potential penetrations with low complexity costs. • However the attackers can still compromise the integrity of the network if they set modest targets.