论文标题
IotMonitor:一个基于马尔可夫模型的隐藏模型安全系统,以识别触发器IOT平台中的关键攻击节点
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms
论文作者
论文摘要
随着物联网设置中触发空间平台的出现和快速开发,由物联网设备之间的交互作用引起的安全漏洞变得更加普遍。该事件发生在一个设备上触发另一个设备中的动作,最终可能有助于创建网络中的一系列事件。对手利用链的效应来妥协物联网设备,并仅通过将恶意事件注入链条而触发感兴趣的动作。为了解决由扳机行动方案引起的安全漏洞,现有的研究工作集中于验证设备的安全性或根据设备上的物理指纹验证某些事件的发生。我们提出了一个安全分析系统IotMonitor,该系统通过观察传感器收集的一系列物理证据来辨别事件发生的基本事件链。我们使用Baum-Welch算法来估计过渡和排放概率以及Viterbi算法来识别事件序列。然后,我们可以在触发序列中确定关键节点,该节点允许攻击者达到最终目标。我们在PEEVES数据集上设计系统的实验结果表明,我们可以从观察值中以很高的精度重建事件发生序列,并确定攻击路径上的关键节点。
With the emergence and fast development of trigger-action platforms in IoT settings, security vulnerabilities caused by the interactions among IoT devices become more prevalent. The event occurrence at one device triggers an action in another device, which may eventually contribute to the creation of a chain of events in a network. Adversaries exploit the chain effect to compromise IoT devices and trigger actions of interest remotely just by injecting malicious events into the chain. To address security vulnerabilities caused by trigger-action scenarios, existing research efforts focus on the validation of the security properties of devices or verification of the occurrence of certain events based on their physical fingerprints on a device. We propose IoTMonitor, a security analysis system that discerns the underlying chain of event occurrences with the highest probability by observing a chain of physical evidence collected by sensors. We use the Baum-Welch algorithm to estimate transition and emission probabilities and the Viterbi algorithm to discern the event sequence. We can then identify the crucial nodes in the trigger-action sequence whose compromise allows attackers to reach their final goals. The experiment results of our designed system upon the PEEVES datasets show that we can rebuild the event occurrence sequence with high accuracy from the observations and identify the crucial nodes on the attack paths.