Optimal Deployments of Defense Mechanisms for the Internet of Things

08/01/2019
by   Mengmeng Ge, et al.
0

Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. Little work has taken hybrid approaches that combine different defense mechanisms in an optimal way to increase the security of the IoT against sophisticated attacks. In this work, we propose a novel approach to generate the strategic deployment of adaptive deception technology and the patch management solution for the IoT under a budget constraint. We use a graphical security model along with three evaluation metrics to measure the effectiveness and efficiency of the proposed defense mechanisms. We apply the multi-objective genetic algorithm (GA) to compute the Pareto optimal deployments of defense mechanisms to maximize the security and minimize the deployment cost. We present a case study to show the feasibility of the proposed approach and to provide the defenders with various ways to choose optimal deployments of defense mechanisms for the IoT. We compare the GA with the exhaustive search algorithm (ESA) in terms of the runtime complexity and performance accuracy in optimality. Our results show that the GA is much more efficient in computing a good spread of the deployments than the ESA, in proportion to the increase of the IoT devices.

READ FULL TEXT
research
08/01/2019

Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things

As a solution to protect and defend a system against inside attacks, man...
research
05/08/2020

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception

Resource constrained Internet-of-Things (IoT) devices are highly likely ...
research
10/30/2017

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Denial of Service (DoS) attacks constitute a major security threat to to...
research
04/11/2019

Deployment Optimization of IoT Devices through Attack Graph Analysis

The Internet of things (IoT) has become an integral part of our life at ...
research
09/16/2021

Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies

Internet of Things (IoT) devices and applications can have significant v...
research
03/01/2022

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks ...
research
04/30/2020

Context-Aware Wireless Connectivity and Processing Unit Optimization for IoT Networks

A novel approach is presented in this work for context-aware connectivit...

Please sign up or login with your details

Forgot password? Click here to reset