2021 IEEE 46th Conference on Local Computer Networks (LCN) 2021
DOI: 10.1109/lcn52139.2021.9524954
|View full text |Cite
|
Sign up to set email alerts
|

Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks

Abstract: Residential ISPs today have limited device-level visibility into subscriber houses, primarily due to network address translation (NAT) technology. The continuous growth of "unmanaged" consumer IoT devices combined with the rise of work-from-home makes home networks attractive targets for cyber attacks. Volumetric attacks sourced from a distributed set of vulnerable IoT devices can impact ISPs by deteriorating the performance of their network, or even making them liable for being a carrier of malicious traffic.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 16 publications
1
13
0
Order By: Relevance
“…Another important aspect of our dataset is that unlike most datasets used thus far (some of which were published), it is not comprised of packet-level raw traffic data but rather is comprised mainly of IPFIX-level aggregated metadata, which results in lower communication/storage overhead while preserving privacy. We note that in [65], a large and diverse IPFIX-based dataset was collected from an IoT testbed, however it (1) only contains benign data, limiting attack detection evaluation, (2) emanates from a single network only, such that collaborative learning can not be properly evaluated, and (3) reflects a limited frequency of human interaction, which is performed by just the lab staff, as opposed to the ongoing and natural real-world interaction with a diverse range of people in multiple disparate home networks reflected in our dataset.…”
Section: Existing Public Datasets For Iot Attack Detectionmentioning
confidence: 80%
See 3 more Smart Citations
“…Another important aspect of our dataset is that unlike most datasets used thus far (some of which were published), it is not comprised of packet-level raw traffic data but rather is comprised mainly of IPFIX-level aggregated metadata, which results in lower communication/storage overhead while preserving privacy. We note that in [65], a large and diverse IPFIX-based dataset was collected from an IoT testbed, however it (1) only contains benign data, limiting attack detection evaluation, (2) emanates from a single network only, such that collaborative learning can not be properly evaluated, and (3) reflects a limited frequency of human interaction, which is performed by just the lab staff, as opposed to the ongoing and natural real-world interaction with a diverse range of people in multiple disparate home networks reflected in our dataset.…”
Section: Existing Public Datasets For Iot Attack Detectionmentioning
confidence: 80%
“…This hardware enabled both the service of continuous smart home monitoring for malicious activities, and the standardized collection of data which can be shared and used for model training; however, it is possible that in the future ISPs would offer such a service themselves and preinstall the necessary software on the home routers they supply, instead of an additional hardware. Second, our method requires correct IoT model identification prior to anomaly detection, in order to enable the training and deployment of an anomaly detector for each IoT model separately; to this end, there are already promising research results regarding IoT identification based on IPFIX records, even behind a NAT [65], [66] (which is a typical setting in home networks). Third, as noted by [65], behavioral changes are not rare in the IoT, which could have an effect on the profile of normal network patterns.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A "whitelist" of IoT behaviors, specified in the form of MUD (Manufacturer Usage Description) profiles, has been employed to detect anomalies [19]. Researchers have employed various ML techniques to learn from the benign behavior of IoT devices to monitor their health and detect malicious incidents [33], [42], [18], [38]. The use of pure benign instances from IoT network traffic in training inference models, without the inclusion of known attack (malicious) instances, enables them to become more robust against unseen and morphing cyber-attacks.…”
Section: Related Workmentioning
confidence: 99%