Proceedings of the 38th Annual Computer Security Applications Conference 2022
DOI: 10.1145/3564625.3564644
|View full text |Cite
|
Sign up to set email alerts
|

Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…In this section, we show how to enable shared experimentation through the FedLab. Specifically, we rely on MUDscope, an IoT network intrusion detection approach [18]. MUDscope first captures anomalous traffic affecting an IoT device in a network environment by leveraging the device's Manufacturer Usage Description (MUD) profile-a manufacturer-provided networking whitelist defined according to the MUD IETF specification [19].…”
Section: B Enabling Shared Experimentation Through the Fedlabmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we show how to enable shared experimentation through the FedLab. Specifically, we rely on MUDscope, an IoT network intrusion detection approach [18]. MUDscope first captures anomalous traffic affecting an IoT device in a network environment by leveraging the device's Manufacturer Usage Description (MUD) profile-a manufacturer-provided networking whitelist defined according to the MUD IETF specification [19].…”
Section: B Enabling Shared Experimentation Through the Fedlabmentioning
confidence: 99%
“…In each experiment, we recorded the local traffic received by the IoT devices at both locations through the default sniff Bundle Box functionality. Then, the recorded traces were processed with MUDscope from [18]. As shown in Fig.…”
Section: B Enabling Shared Experimentation Through the Fedlabmentioning
confidence: 99%
See 1 more Smart Citation
“…Our IoC detection is based on regular expressions for various IoCs. Unfortunately, to the best of our knowledge, no ground-truth dataset of IoCs occurring in natural text exists apart from the reports that we labeled manually 10 . Hence, to evaluate the performance of our regular expressions and compare them with Chain-Smith, we use the 50 reports from the ChainSmith dataset for which we manually extracted all IoC examples as ground truth.…”
Section: Tokenizationmentioning
confidence: 99%
“…Similar to sequencing events, we performed a 10-fold search for the hidden dimension of the Context Builder, and evaluated whether the threshold for a correctly predicted event reached at least 0.2. Here, we searched powers of 2, 2 1 , 2 2 , 2 3 , ...2 10 and found an optimal value for 2 7 = 128. The same search over the 𝛿 values of 0.0 to 1.0 with steps of 0.1 yielded an optimal value of 0.1.…”
Section: The Context Buildermentioning
confidence: 99%