Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3108009.3108037acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewsnConference Proceedingsconference-collections
research-article

Poster: State of the Art IDS Design for IoT

Published: 20 February 2017 Publication History

Abstract

This paper summarizes the ongoing work of us which aims to protect Internet-of-Things networks against Denial-of-Service attacks. The attacks that our anomaly-based Intrusion Detection System targets can be insider or outsider attacks. The system we are proposing can be thought of as an improved version of SVELTE IDS which successfully solves the problem of detection system components’ placement within the low power and lossy network. Similar to the reference work, we place the monitoring part of the detection system to the resource constrained devices and the detection part to the border router. In addition to this, we consider extended 6LoWPAN networks and incorporate the cooperative autonomous detection model so that multiple IoT networks sharing the same DODAG ID cooperate and get stronger against coordinated attacks.

References

[1]
A. Aris, S. Oktug, and S. Yalcin. Internet-of-things security: Denial of service attacks. In Signal Processing and Communications Applications Conference (SIU), 2015 23th, pages 903–906, May 2015.
[2]
F. Dressler, G. Münz, and G. Carle. Attack Detection using Cooperating Autonomous Detection Systems (CATS). In 1st IFIP International Workshop on Autonomic Communication (WAC 2004), Poster Session, Berlin, Germany, October 2004. IFIP.
[3]
K. Kalkan and F. Alagoz. A distributed filtering mechanism against {DDoS} attacks: Scoreforcore. Computer Networks, 108:199 – 209, 2016.
[4]
M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler. Standardized Protocol Stack for the Internet of (Important) Things. IEEE Communications Surveys Tutorials, 15(3):1389–1406, Third 2013.
[5]
S. Raza, L. Wallgren, and T. Voigt. Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8):2661 – 2674, 2013.
[6]
T. Tsao, R. Alexander, M. Dohler, V. Daza, A. Lozano, and M. Richardson. A Security Threat Analysis for the Routing Protocol for LowPower and Lossy Networks (RPLs). RFC 7416 (Informational), Jan. 2015.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EWSN ’17: Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks
February 2017
336 pages
ISBN:9780994988614

Sponsors

  • EWSN: International Conference on Embedded Wireless Systems and Networks

In-Cooperation

Publisher

Junction Publishing

United States

Publication History

Published: 20 February 2017

Check for updates

Qualifiers

  • Research-article

Acceptance Rates

EWSN ’17 Paper Acceptance Rate 18 of 49 submissions, 37%;
Overall Acceptance Rate 81 of 195 submissions, 42%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media