Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

05/11/2021
by   Anna Maria Mandalari, et al.
0

Despite the prevalence of Internet of Things (IoT) devices, there is little information about the purpose and risks of the Internet traffic these devices generate, and consumers have limited options for controlling those risks. A key open question is whether one can mitigate these risks by automatically blocking some of the Internet connections from IoT devices, without rendering the devices inoperable. In this paper, we address this question by developing a rigorous methodology that relies on automated IoT-device experimentation to reveal which network connections (and the information they expose) are essential, and which are not. We further develop strategies to automatically classify network traffic destinations as either required (i.e., their traffic is essential for devices to work properly) or not, hence allowing firewall rules to block traffic sent to non-required destinations without breaking the functionality of the device. We find that indeed 16 among the 31 devices we tested have at least one blockable non-required destination, with the maximum number of blockable destinations for a device being 11. We further analyze the destination of network traffic and find that all third parties observed in our experiments are blockable, while first and support parties are neither uniformly required or non-required. Finally, we demonstrate the limitations of existing blocklists on IoT traffic, propose a set of guidelines for automatically limiting non-essential IoT traffic, and we develop a prototype system that implements these guidelines.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/16/2020

Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations

The consumer Internet of Things (IoT) space has experienced a significan...
research
10/26/2021

Rapid IoT Device Identification at the Edge

Consumer Internet of Things (IoT) devices are increasingly common in eve...
research
12/24/2018

Automatic Device Classification from Network Traffic Streams of Internet of Things

With the widespread adoption of Internet of Things (IoT), billions of ev...
research
11/07/2019

Cellular IoT Traffic Characterization and Evolution

The adoption of Internet of Things (IoT) technologies is increasing and ...
research
09/14/2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Security experts have demonstrated numerous risks imposed by Internet of...
research
01/17/2023

Quantifying and Managing Impacts of Concept Drifts on IoT Traffic Inference in Residential ISP Networks

Millions of vulnerable consumer IoT devices in home networks are the ena...
research
05/06/2021

A Cybersecurity Guide for Using Fitness Devices

The popularity of wearable devices is growing exponentially, with consum...

Please sign up or login with your details

Forgot password? Click here to reset