Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my.

Slides:



Advertisements
Similar presentations
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Advertisements

Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CSC8320. Outline Content from the book Recent Work Future Work.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CPT 123 Internet Skills Class Notes Internet Security Session A.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Final Project: Advanced Security Blade IPS and DLP blades.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
WP2: Security aware low power IoT Processor
Are our smart devices really that smart ?
Koji Nakao, Dai Arisue NICT, Japan
Port Knocking Benjamin DiYanni.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Instructor Materials Chapter 7 Network Security
Real-time protection for web sites and web apps against ATTACKS
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Introduction to Networking
Security of a Local Area Network
Forensics Week 11.
Security in Networking
Internet of Things
Risks & Reality Cyber Security Risks & Reality
Network Security: IP Spoofing and Firewall
Internet of Things Vulnerabilities
The Internet of Unsecure Things
Home Internet Vulnerabilities
Data security in iot devices
Intrusion Detection system
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Chapter # 3 COMPUTER AND INTERNET CRIME
Test 3 review FTP & Cybersecurity
Hush Smart Baby Monitor Exploit
6. Application Software Security
IoT: Privacy and Security
In the attack index…what number is your Company?
Cybersecurity Simplified: Phishing
Botnet of Things: Cybersecurity
Cleaning Up the Internet of Evil Things
Presentation transcript:

Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my colleague(Eirini) and I working on that is developing an adaptive intrusion detection system for internet of things devices. Unfortunately she could not be present here due to health issue and I will try my best to present on her behalf. Eirini Anthi, Amir Javed, lowri Williams, pete burnap, & george theodorakopoulos

The Internet of Things (IoT) Interconnected every day objects with network connectivity, allowing them to send and receive data. IoT have access to sensitive personal information such as banking information, usernames, passwords, etc. Variety of IoT designed for different applications (fitness, smart home, etc.) Just say in 5 seconds what IoT devices are.

The Internet of Things (IoT) Say that the amount of IoT is increasing exponentioally Image 1: The amount of IoT devices is increasing exponentially

The Internet of “Evil” Things Devices are insecure. HP IoT study showed that popular IoT devices have on average 25 security vulnerabilities. These range from Heartbleed, to Denial of Service (DDoS), to weak passwords, to cross-site scripting, etc. Studies, have exposed vulnerabilities on baby monitors, smart TVs, and home automation systems. Highlight the issues of these devices. PERCEPTION | REALITY

The Internet of “Evil” Things Smart TVs have been spying on their owners. Hackers have been able to intercept content of smart cameras and baby monitors. October 16’: Mirai Botnet caused one of the largest DDoS attacks in history, bringing down Twitter, Netflix, and Spotify. April 17’: Brickerbot malware completely destroyed thousands of IoT devices. And here the Mirai bot net and Brickerbot malware. PERCEPTION | REALITY

The Internet of “Evil” Things IoT devices become more ubiquitous and transparent! Concern about the threat of unauthorized personal mobile devices, wearable tech, etc., on the network So: Can we predict malicious behavior based on network traffic? How can we detect malicious IoT devices on a network? The 2 main quetsions we have PERCEPTION | REALITY

Pulse Tool A novel predictive model that can identify malicious IoT nodes in a network based on their network activity. The model consists of two components: a) The first component is based on a Machine Learning (ML) approach (learns the networking behavior of the IoT-based network). b) The second component is a rule based approach, which is established from a security policy configured by the network administrator. The combination of these components creates an adaptive and flexible model, which accurately detects malicious IoT devices in the network More details see the poster The log file at present that we have created to conduct initial experiment contained ( time , source IP , destination IP , protocol , length , class ) which was created by carrying out attacks scan attacks (quick scan , ping scan , regular scan and intense scan) PERCEPTION | REALITY

Thank you!