Verifying and Monitoring IoTs Network Behavior using MUD Profiles

02/07/2019
by   Ayyoob Hamza, et al.
0

IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist IoT manufacturers in developing and verifying MUD profiles, while also helping adopters of these devices to ensure they are compatible with their organizational policies and track devices network behavior based on their MUD profile. Our first contribution is to develop a tool that takes the traffic trace of an arbitrary IoT device as input and automatically generates the MUD profile for it. We contribute our tool as open source, apply it to 28 consumer IoT devices, and highlight insights and challenges encountered in the process. Our second contribution is to apply a formal semantic framework that not only validates a given MUD profile for consistency, but also checks its compatibility with a given organizational policy. We apply our framework to representative organizations and selected devices, to demonstrate how MUD can reduce the effort needed for IoT acceptance testing. Finally, we show how operators can dynamically identify IoT devices using known MUD profiles and monitor their behavioral changes on their network.

READ FULL TEXT

page 1

page 4

page 8

page 10

page 14

research
04/12/2018

Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

IoT devices are increasingly being implicated in cyber-attacks, driving ...
research
01/28/2020

IoT Behavioral Monitoring via Network Traffic Analysis

Smart homes, enterprises, and cities are increasingly being equipped wit...
research
03/02/2023

IoT Device Identification Based on Network Communication Analysis Using Deep Learning

Attack vectors for adversaries have increased in organizations because o...
research
10/11/2022

A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices

With the rapid growth in the number of IoT devices being added to the ne...
research
03/27/2018

Cleartext Data Transmissions in Consumer IoT Medical Devices

This paper introduces a method to capture network traffic from medical I...
research
06/20/2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

Nowadays, IoT devices integrate a wealth of third-party components (TPCs...

Please sign up or login with your details

Forgot password? Click here to reset