2020
DOI: 10.1109/jsac.2020.2986621
|View full text |Cite
|
Sign up to set email alerts
|

Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks

Abstract: As the IoT adoption is growing in several fields, cybersecurity attacks involving low-cost enduser devices are increasing accordingly, undermining the expected deployment of IoT solutions in a broad range of scenarios. To address this challenge, emerging Network Function Virtualization (NFV) and Software Defined Networking (SDN) technologies can introduce new security enablers, thereby endowing IoT systems and networks with higher degree of scalability and flexibility required to cope with the security of mass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
50
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 90 publications
(51 citation statements)
references
References 41 publications
1
50
0
Order By: Relevance
“…Although it is out of the scope of this paper, for the sake of completeness, it is worth mentioning that our framework when deployed in the smart building testbed scenario, enforces a mitigation plan that 1) re-configures the vAAA (virtual authentication agent), 2) enables a vChannelProtection to establish secure DTLs communications, 3) enforces new traffic filtering rules with SDN to drop malicious traffic, and 4) optionally turns-off and/or flashes the IoT device. These reaction countermeasures are being implemented and evaluated in the scope of Anastacia EU project [26], [48], [49], and are beyond the scope of this paper, which focuses on evaluating the machine learning mechanisms to detect the cyber-attacks in IoT systems.…”
Section: B Anomaly-based Intrusion Detectionmentioning
confidence: 99%
“…Although it is out of the scope of this paper, for the sake of completeness, it is worth mentioning that our framework when deployed in the smart building testbed scenario, enforces a mitigation plan that 1) re-configures the vAAA (virtual authentication agent), 2) enables a vChannelProtection to establish secure DTLs communications, 3) enforces new traffic filtering rules with SDN to drop malicious traffic, and 4) optionally turns-off and/or flashes the IoT device. These reaction countermeasures are being implemented and evaluated in the scope of Anastacia EU project [26], [48], [49], and are beyond the scope of this paper, which focuses on evaluating the machine learning mechanisms to detect the cyber-attacks in IoT systems.…”
Section: B Anomaly-based Intrusion Detectionmentioning
confidence: 99%
“…In [15], Galeano et al propose a entropy-based solution to detect and mitigate DDoS Attacks in IoT-Based systems relying on SDN. Likewise, authors in [5] relies on a similar approach for automatic management virtual IoT honeynets to mitigate cyberattacks. However, those research works did not followed a semantic-based approach for the security orchestration, whereby allowing formal verification and conflict detection of the security policies enforced in the system, inferring meaningful conclusions that can be used to drive the orchestration.…”
Section: Nfv/sdn-based Security Orchestration In Iotmentioning
confidence: 99%
“…To this aim, NFV can rely on virtualization and Cloud computing techniques to provide elastic capabilities needed to achieve a fast reaction and recovery from cyberattacks. In this sense, lightweight Virtual network Security Functions (VSF) such as vFirewalls [3], vAAA [4], vIDS or vIoT-Honeynet [5] can be dynamically allocated and orchestrated in the IoT domain, while the SDN approach can help to dynamically (re)configure the network by software, splitting the control and data planes. This security management can be driven by orchestration policies and security intents, that can be translated into security configurations to configure, manage and deploy the associated VSFs and VNFs across edges, fog nodes and Cloud data centers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The work carried out by Yuan et al [27] has used a secret sharing mechanism in order to forward secured data for effective control over the attacks of varied kinds. The work of Zarca et al [28] [29] has developed a comprehensive architecture of the security, considering network function virtualization for dealing with existing cybersecurity problems over IoT architecture that uses SDN. The author has used a honeynet strategy in order to address this problem.…”
mentioning
confidence: 99%