4,774 research outputs found

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead

    Human Crowdsourcing Data for Indoor Location Applied to Ambient Assisted Living Scenarios

    Get PDF
    In the last decades, the rise of life expectancy has accelerated the demand for new technological solutions to provide a longer life with improved quality. One of the major areas of the Ambient Assisted Living aims to monitor the elderly location indoors. For this purpose, indoor positioning systems are valuable tools and can be classified depending on the need of a supporting infrastructure. Infrastructure-based systems require the investment on expensive equipment and existing infrastructure-free systems, although rely on the pervasively available characteristics of the buildings, present some limitations regarding the extensive process of acquiring and maintaining fingerprints, the maps that store the environmental characteristics to be used in the localisation phase. These problems hinder indoor positioning systems to be deployed in most scenarios. To overcome these limitations, an algorithm for the automatic construction of indoor floor plans and environmental fingerprints is proposed. With the use of crowdsourcing techniques, where the extensiveness of a task is reduced with the help of a large undefined group of users, the algorithm relies on the combination ofmultiple sources of information, collected in a non-annotated way by common smartphones. The crowdsourced data is composed by inertial sensors, responsible for estimating the users’ trajectories, Wi-Fi radio and magnetic field signals. Wi-Fi radio data is used to cluster the trajectories into smaller groups, each corresponding to specific areas of the building. Distance metrics applied to magnetic field signals are used to identify geomagnetic similarities between different users’ trajectories. The building’s floor plan is then automatically created, which results in fingerprints labelled with physical locations. Experimental results show that the proposed algorithm achieved comparable floor plan and fingerprints to those acquired manually, allowing the conclusion that is possible to automate the setup process of infrastructure-free systems. With these results, this solution can be applied in any fingerprinting-based indoor positioning system

    FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic

    Get PDF
    Mobile-application fingerprinting of network traffic is valuable for many security solutions as it provides insights into the apps active on a network. Unfortunately, existing techniques require prior knowledge of apps to be able to recognize them. However, mobile environments are constantly evolving, i.e., apps are regularly installed, updated, and uninstalled. Therefore, it is infeasible for existing fingerprinting approaches to cover all apps that may appear on a network. Moreover, most mobile traffic is encrypted, shows similarities with other apps, e.g., due to common libraries or the use of content delivery networks, and depends on user input, further complicating the fingerprinting process.As a solution, we propose FlowPrint, a semi-supervised approach for fingerprinting mobile apps from (encrypted) network traffic.We automatically find temporal correlations among destination-related features of network traffic and use these correlations to generate app fingerprints.Our approach is able to fingerprint previously unseen apps, something that existing techniques fail to achieve.We evaluate our approach for both Android and iOS in the setting of app recognition, where we achieve an accuracy of 89.2%, significantly outperforming state-of-the-art solutions.In addition, we show that our approach can detect previously unseen apps with a precision of 93.5%, detecting 72.3% of apps within the first five minutes of communication
    • …
    corecore