TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infras...
- Autores:
-
Useche Pelaez, David
Diaz Lopez, Daniel
Nespoli, Pantaleone
Gomez Marmol, Felix
- Tipo de recurso:
- Documento de conferencia en no proceso
- Fecha de publicación:
- 2018
- Institución:
- Escuela Colombiana de Ingeniería Julio Garavito
- Repositorio:
- Repositorio Institucional ECI
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.escuelaing.edu.co:001/1798
- Acceso en línea:
- https://repositorio.escuelaing.edu.co/handle/001/1798
- Palabra clave:
- Internet
Internet of Things
Arquitectura de computadores
Internet de las Cosas
Aprendizaje automático
Seguridad de sistemas informáticos
Security
Monitoring
Servers
Malware
Computer architecture
- Rights
- closedAccess
- License
- https://creativecommons.org/licenses/by/4.0/
id |
ESCUELAIG2_f86e22206619a02fc53df8642e2f2d87 |
---|---|
oai_identifier_str |
oai:repositorio.escuelaing.edu.co:001/1798 |
network_acronym_str |
ESCUELAIG2 |
network_name_str |
Repositorio Institucional ECI |
repository_id_str |
|
dc.title.eng.fl_str_mv |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
title |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
spellingShingle |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats Internet Internet of Things Arquitectura de computadores Internet de las Cosas Aprendizaje automático Seguridad de sistemas informáticos Security Monitoring Servers Malware Computer architecture |
title_short |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
title_full |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
title_fullStr |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
title_full_unstemmed |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
title_sort |
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats |
dc.creator.fl_str_mv |
Useche Pelaez, David Diaz Lopez, Daniel Nespoli, Pantaleone Gomez Marmol, Felix |
dc.contributor.author.none.fl_str_mv |
Useche Pelaez, David Diaz Lopez, Daniel Nespoli, Pantaleone Gomez Marmol, Felix |
dc.contributor.researchgroup.spa.fl_str_mv |
Informática |
dc.subject.armarc.none.fl_str_mv |
Internet Internet of Things |
topic |
Internet Internet of Things Arquitectura de computadores Internet de las Cosas Aprendizaje automático Seguridad de sistemas informáticos Security Monitoring Servers Malware Computer architecture |
dc.subject.armarc.spa.fl_str_mv |
Arquitectura de computadores Internet de las Cosas Aprendizaje automático Seguridad de sistemas informáticos |
dc.subject.proposal.eng.fl_str_mv |
Security Monitoring Servers Malware Computer architecture |
description |
The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT. |
publishDate |
2018 |
dc.date.issued.none.fl_str_mv |
2018 |
dc.date.accessioned.none.fl_str_mv |
2021-11-04T16:43:20Z |
dc.date.available.none.fl_str_mv |
2021-11-04T16:43:20Z |
dc.type.spa.fl_str_mv |
Documento de Conferencia |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 http://purl.org/coar/resource_type/c_c94f |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_18cp |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/conferenceObject |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
format |
http://purl.org/coar/resource_type/c_18cp |
status_str |
publishedVersion |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.escuelaing.edu.co/handle/001/1798 |
url |
https://repositorio.escuelaing.edu.co/handle/001/1798 |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.conferencedate.spa.fl_str_mv |
15-18 Oct. 2018 |
dc.relation.conferenceplace.spa.fl_str_mv |
Valencia, Spain |
dc.relation.indexed.spa.fl_str_mv |
N/A |
dc.relation.ispartofconference.spa.fl_str_mv |
2018 Fifth International Conference on Internet of Things: Systems, Management and Security |
dc.relation.references.spa.fl_str_mv |
Pantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018. Gartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016. Srisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015. Yong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015. Markus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017. Huansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013. Alessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016. Huansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012. Shin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017. Jonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017. Yin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016. Al-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014. Jesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011. Latifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016. Ciampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017. Ken. Dunham et al., Android Malware and Analysis, CRC Press, 2014. Joshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014. Onur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017. Madhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017. Boštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013. Daniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014. |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_14cb |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/closedAccess |
dc.rights.creativecommons.spa.fl_str_mv |
Atribución 4.0 Internacional (CC BY 4.0) |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0/ Atribución 4.0 Internacional (CC BY 4.0) http://purl.org/coar/access_right/c_14cb |
eu_rights_str_mv |
closedAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
IEEE Xplore |
dc.publisher.place.spa.fl_str_mv |
Spain |
institution |
Escuela Colombiana de Ingeniería Julio Garavito |
bitstream.url.fl_str_mv |
https://repositorio.escuelaing.edu.co/bitstream/001/1798/1/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf https://repositorio.escuelaing.edu.co/bitstream/001/1798/2/license.txt https://repositorio.escuelaing.edu.co/bitstream/001/1798/3/IEEE.pdf.txt https://repositorio.escuelaing.edu.co/bitstream/001/1798/5/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.txt https://repositorio.escuelaing.edu.co/bitstream/001/1798/4/IEEE.pdf.jpg https://repositorio.escuelaing.edu.co/bitstream/001/1798/6/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.jpg |
bitstream.checksum.fl_str_mv |
f86ef00dff6b7b69fd1a469746c1ba13 5a7ca94c2e5326ee169f979d71d0f06e d784fa8b6d98d27699781bd9a7cf19f0 d784fa8b6d98d27699781bd9a7cf19f0 db0936910005dffff6edc788e1430c6c db0936910005dffff6edc788e1430c6c |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Escuela Colombiana de Ingeniería Julio Garavito |
repository.mail.fl_str_mv |
repositorio.eci@escuelaing.edu.co |
_version_ |
1814355622240452608 |
spelling |
Useche Pelaez, Davidb8efef4ab4506991db1d8cf56d3255a2600Diaz Lopez, Danielf645852c8fa5a8e588984143d78f7963600Nespoli, Pantaleoneca87776112d767308172d768ee634197600Gomez Marmol, Felix9a1fc74ed02906ce7c56d39e0ba68533600Informática2021-11-04T16:43:20Z2021-11-04T16:43:20Z2018https://repositorio.escuelaing.edu.co/handle/001/1798The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.El Internet de las cosas (IoT) se considera una tecnología emergente con potencialidades considerables. Su paradigma de todo conectado entre sí invadió el mundo real, con objetos inteligentes ubicados en varios aparatos cotidianos capaces de comunicarse de forma autónoma a través de infraestructuras de red ya existentes. Como contrapartida, el gran avance que ha supuesto el IoT en nuestra vida trae consigo al mismo tiempo graves problemas de seguridad, ya que el flujo de información entre los objetos queda mayoritariamente desprotegido frente a atacantes malintencionados. El artículo que nos ocupa propone TRIS, un novedoso centinela para proteger los entornos inteligentes de las ciberamenazas. Nuestro centinela protege los dispositivos IoT mediante tres anillos de defensa, lo que da como resultado una protección más precisa. Además, analizamos la implementación real del centinela utilizando herramientas de código abierto. Se llevan a cabo experimentos exhaustivos en el centinela, lo que demuestra que el centinela desplegado funciona meticulosamente incluso en condiciones de mucho estrés, lo que demuestra la aplicabilidad de TRIS en un escenario distribuido y dinámico como IoT.application/pdfengIEEE XploreSpainhttps://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/closedAccessAtribución 4.0 Internacional (CC BY 4.0)http://purl.org/coar/access_right/c_14cbTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-ThreatsDocumento de Conferenciainfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_18cphttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/resource_type/c_c94fTextinfo:eu-repo/semantics/conferenceObjecthttp://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a8515-18 Oct. 2018Valencia, SpainN/A2018 Fifth International Conference on Internet of Things: Systems, Management and SecurityPantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.Gartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.Srisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.Yong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.Markus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.Huansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.Alessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.Huansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.Shin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.Jonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.Yin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.Al-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.Jesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.Latifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.Ciampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.Ken. Dunham et al., Android Malware and Analysis, CRC Press, 2014.Joshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.Onur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.Madhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.Boštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.Daniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.InternetInternet of ThingsArquitectura de computadoresInternet de las CosasAprendizaje automáticoSeguridad de sistemas informáticosSecurityMonitoringServersMalwareComputer architectureORIGINALTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdfTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdfapplication/pdf146969https://repositorio.escuelaing.edu.co/bitstream/001/1798/1/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdff86ef00dff6b7b69fd1a469746c1ba13MD51metadata only accessLICENSElicense.txtlicense.txttext/plain; charset=utf-81881https://repositorio.escuelaing.edu.co/bitstream/001/1798/2/license.txt5a7ca94c2e5326ee169f979d71d0f06eMD52open accessTEXTIEEE.pdf.txtIEEE.pdf.txtExtracted texttext/plain2https://repositorio.escuelaing.edu.co/bitstream/001/1798/3/IEEE.pdf.txtd784fa8b6d98d27699781bd9a7cf19f0MD53metadata only accessTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.txtTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.txtExtracted texttext/plain2https://repositorio.escuelaing.edu.co/bitstream/001/1798/5/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.txtd784fa8b6d98d27699781bd9a7cf19f0MD55metadata only accessTHUMBNAILIEEE.pdf.jpgIEEE.pdf.jpgGenerated Thumbnailimage/jpeg5458https://repositorio.escuelaing.edu.co/bitstream/001/1798/4/IEEE.pdf.jpgdb0936910005dffff6edc788e1430c6cMD54metadata only accessTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.jpgTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.jpgGenerated Thumbnailimage/jpeg5458https://repositorio.escuelaing.edu.co/bitstream/001/1798/6/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.jpgdb0936910005dffff6edc788e1430c6cMD56metadata only access001/1798oai:repositorio.escuelaing.edu.co:001/17982022-07-27 10:21:12.295metadata only accessRepositorio Escuela Colombiana de Ingeniería Julio Garavitorepositorio.eci@escuelaing.edu.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 |