TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats

The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infras...

Full description

Autores:
Useche Pelaez, David
Diaz Lopez, Daniel
Nespoli, Pantaleone
Gomez Marmol, Felix
Tipo de recurso:
Documento de conferencia en no proceso
Fecha de publicación:
2018
Institución:
Escuela Colombiana de Ingeniería Julio Garavito
Repositorio:
Repositorio Institucional ECI
Idioma:
eng
OAI Identifier:
oai:repositorio.escuelaing.edu.co:001/1798
Acceso en línea:
https://repositorio.escuelaing.edu.co/handle/001/1798
Palabra clave:
Internet
Internet of Things
Arquitectura de computadores
Internet de las Cosas
Aprendizaje automático
Seguridad de sistemas informáticos
Security
Monitoring
Servers
Malware
Computer architecture
Rights
closedAccess
License
https://creativecommons.org/licenses/by/4.0/
id ESCUELAIG2_f86e22206619a02fc53df8642e2f2d87
oai_identifier_str oai:repositorio.escuelaing.edu.co:001/1798
network_acronym_str ESCUELAIG2
network_name_str Repositorio Institucional ECI
repository_id_str
dc.title.eng.fl_str_mv TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
title TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
spellingShingle TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
Internet
Internet of Things
Arquitectura de computadores
Internet de las Cosas
Aprendizaje automático
Seguridad de sistemas informáticos
Security
Monitoring
Servers
Malware
Computer architecture
title_short TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
title_full TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
title_fullStr TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
title_full_unstemmed TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
title_sort TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
dc.creator.fl_str_mv Useche Pelaez, David
Diaz Lopez, Daniel
Nespoli, Pantaleone
Gomez Marmol, Felix
dc.contributor.author.none.fl_str_mv Useche Pelaez, David
Diaz Lopez, Daniel
Nespoli, Pantaleone
Gomez Marmol, Felix
dc.contributor.researchgroup.spa.fl_str_mv Informática
dc.subject.armarc.none.fl_str_mv Internet
Internet of Things
topic Internet
Internet of Things
Arquitectura de computadores
Internet de las Cosas
Aprendizaje automático
Seguridad de sistemas informáticos
Security
Monitoring
Servers
Malware
Computer architecture
dc.subject.armarc.spa.fl_str_mv Arquitectura de computadores
Internet de las Cosas
Aprendizaje automático
Seguridad de sistemas informáticos
dc.subject.proposal.eng.fl_str_mv Security
Monitoring
Servers
Malware
Computer architecture
description The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.
publishDate 2018
dc.date.issued.none.fl_str_mv 2018
dc.date.accessioned.none.fl_str_mv 2021-11-04T16:43:20Z
dc.date.available.none.fl_str_mv 2021-11-04T16:43:20Z
dc.type.spa.fl_str_mv Documento de Conferencia
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
http://purl.org/coar/resource_type/c_c94f
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_18cp
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/conferenceObject
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
format http://purl.org/coar/resource_type/c_18cp
status_str publishedVersion
dc.identifier.uri.none.fl_str_mv https://repositorio.escuelaing.edu.co/handle/001/1798
url https://repositorio.escuelaing.edu.co/handle/001/1798
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.conferencedate.spa.fl_str_mv 15-18 Oct. 2018
dc.relation.conferenceplace.spa.fl_str_mv Valencia, Spain
dc.relation.indexed.spa.fl_str_mv N/A
dc.relation.ispartofconference.spa.fl_str_mv 2018 Fifth International Conference on Internet of Things: Systems, Management and Security
dc.relation.references.spa.fl_str_mv Pantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.
Gartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.
Srisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.
Yong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.
Markus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.
Huansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.
Alessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.
Huansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.
Shin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.
Jonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.
Yin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.
Al-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.
Jesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.
Latifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.
Ciampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.
Ken. Dunham et al., Android Malware and Analysis, CRC Press, 2014.
Joshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.
Onur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.
Madhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.
Boštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.
Daniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_14cb
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/closedAccess
dc.rights.creativecommons.spa.fl_str_mv Atribución 4.0 Internacional (CC BY 4.0)
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
Atribución 4.0 Internacional (CC BY 4.0)
http://purl.org/coar/access_right/c_14cb
eu_rights_str_mv closedAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv IEEE Xplore
dc.publisher.place.spa.fl_str_mv Spain
institution Escuela Colombiana de Ingeniería Julio Garavito
bitstream.url.fl_str_mv https://repositorio.escuelaing.edu.co/bitstream/001/1798/1/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf
https://repositorio.escuelaing.edu.co/bitstream/001/1798/2/license.txt
https://repositorio.escuelaing.edu.co/bitstream/001/1798/3/IEEE.pdf.txt
https://repositorio.escuelaing.edu.co/bitstream/001/1798/5/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.txt
https://repositorio.escuelaing.edu.co/bitstream/001/1798/4/IEEE.pdf.jpg
https://repositorio.escuelaing.edu.co/bitstream/001/1798/6/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.jpg
bitstream.checksum.fl_str_mv f86ef00dff6b7b69fd1a469746c1ba13
5a7ca94c2e5326ee169f979d71d0f06e
d784fa8b6d98d27699781bd9a7cf19f0
d784fa8b6d98d27699781bd9a7cf19f0
db0936910005dffff6edc788e1430c6c
db0936910005dffff6edc788e1430c6c
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Escuela Colombiana de Ingeniería Julio Garavito
repository.mail.fl_str_mv repositorio.eci@escuelaing.edu.co
_version_ 1814355622240452608
spelling Useche Pelaez, Davidb8efef4ab4506991db1d8cf56d3255a2600Diaz Lopez, Danielf645852c8fa5a8e588984143d78f7963600Nespoli, Pantaleoneca87776112d767308172d768ee634197600Gomez Marmol, Felix9a1fc74ed02906ce7c56d39e0ba68533600Informática2021-11-04T16:43:20Z2021-11-04T16:43:20Z2018https://repositorio.escuelaing.edu.co/handle/001/1798The Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.El Internet de las cosas (IoT) se considera una tecnología emergente con potencialidades considerables. Su paradigma de todo conectado entre sí invadió el mundo real, con objetos inteligentes ubicados en varios aparatos cotidianos capaces de comunicarse de forma autónoma a través de infraestructuras de red ya existentes. Como contrapartida, el gran avance que ha supuesto el IoT en nuestra vida trae consigo al mismo tiempo graves problemas de seguridad, ya que el flujo de información entre los objetos queda mayoritariamente desprotegido frente a atacantes malintencionados. El artículo que nos ocupa propone TRIS, un novedoso centinela para proteger los entornos inteligentes de las ciberamenazas. Nuestro centinela protege los dispositivos IoT mediante tres anillos de defensa, lo que da como resultado una protección más precisa. Además, analizamos la implementación real del centinela utilizando herramientas de código abierto. Se llevan a cabo experimentos exhaustivos en el centinela, lo que demuestra que el centinela desplegado funciona meticulosamente incluso en condiciones de mucho estrés, lo que demuestra la aplicabilidad de TRIS en un escenario distribuido y dinámico como IoT.application/pdfengIEEE XploreSpainhttps://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/closedAccessAtribución 4.0 Internacional (CC BY 4.0)http://purl.org/coar/access_right/c_14cbTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-ThreatsDocumento de Conferenciainfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_18cphttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/resource_type/c_c94fTextinfo:eu-repo/semantics/conferenceObjecthttp://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a8515-18 Oct. 2018Valencia, SpainN/A2018 Fifth International Conference on Internet of Things: Systems, Management and SecurityPantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.Gartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.Srisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.Yong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.Markus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.Huansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.Alessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.Huansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.Shin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.Jonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.Yin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.Al-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.Jesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.Latifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.Ciampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.Ken. Dunham et al., Android Malware and Analysis, CRC Press, 2014.Joshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.Onur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.Madhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.Boštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.Daniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.InternetInternet of ThingsArquitectura de computadoresInternet de las CosasAprendizaje automáticoSeguridad de sistemas informáticosSecurityMonitoringServersMalwareComputer architectureORIGINALTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdfTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdfapplication/pdf146969https://repositorio.escuelaing.edu.co/bitstream/001/1798/1/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdff86ef00dff6b7b69fd1a469746c1ba13MD51metadata only accessLICENSElicense.txtlicense.txttext/plain; charset=utf-81881https://repositorio.escuelaing.edu.co/bitstream/001/1798/2/license.txt5a7ca94c2e5326ee169f979d71d0f06eMD52open accessTEXTIEEE.pdf.txtIEEE.pdf.txtExtracted texttext/plain2https://repositorio.escuelaing.edu.co/bitstream/001/1798/3/IEEE.pdf.txtd784fa8b6d98d27699781bd9a7cf19f0MD53metadata only accessTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.txtTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.txtExtracted texttext/plain2https://repositorio.escuelaing.edu.co/bitstream/001/1798/5/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.txtd784fa8b6d98d27699781bd9a7cf19f0MD55metadata only accessTHUMBNAILIEEE.pdf.jpgIEEE.pdf.jpgGenerated Thumbnailimage/jpeg5458https://repositorio.escuelaing.edu.co/bitstream/001/1798/4/IEEE.pdf.jpgdb0936910005dffff6edc788e1430c6cMD54metadata only accessTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.jpgTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats.pdf.jpgGenerated Thumbnailimage/jpeg5458https://repositorio.escuelaing.edu.co/bitstream/001/1798/6/TRIS%3a%20A%20Three-Rings%20IoT%20Sentinel%20to%20Protect%20Against%20Cyber-Threats.pdf.jpgdb0936910005dffff6edc788e1430c6cMD56metadata only access001/1798oai:repositorio.escuelaing.edu.co:001/17982022-07-27 10:21:12.295metadata only accessRepositorio Escuela Colombiana de Ingeniería Julio Garavitorepositorio.eci@escuelaing.edu.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