Verifying and Monitoring IoTs Network Behavior Using MUD Profiles

نویسندگان

چکیده

IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order reduce this risk, IETF is pushing vendors develop formal specifications of intended purpose their devices, form a Manufacturer Usage Description (MUD), so that network behavior any operating environment can be locked down verified rigorously. This article aims assist manufacturers developing verifying MUD profiles, while also helping adopters these ensure compatible with organizational policies track device using profile. Our first contribution tool takes traffic trace an arbitrary as input automatically generates profile for it. We contribute our open source, apply it 28 consumer highlight insights challenges encountered process. second semantic framework not only validates given consistency, but checks its compatibility policy. representative organizations selected demonstrate how effort needed acceptance testing. Finally, we show operators dynamically identify known profiles monitor behavioral changes network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monitoring Nonlinear Profiles Using Wavelets

In many manufacturing processes, the quality of a product is characterized by a non-linear relationship between a dependent variable and one or more independent variables. Using nonlinear regression for monitoring nonlinear profiles have been proposed in the literature of profile monitoring which is faced with two problems 1) the distribution of regression coefficients in small samples is unkno...

متن کامل

monitoring nonlinear profiles using wavelets

in many manufacturing processes, the quality of a product is characterized by a non-linear relationship between a dependent variable and one or more independent variables. using nonlinear regression for monitoring nonlinear profiles have been proposed in the literature of profile monitoring which is faced with two problems 1) the distribution of regression coefficients in small samples is unkno...

متن کامل

Verifying Program Profiles

Execution profiles have become increasingly important for guiding code optimization. However, little has been done to develop ways to check automatically that a profile does, in fact, reflect the actual execution behavior of a program. This paper describes a framework that uses program monitoring techniques in a way that allows the automatic checking of a wide variety of profile data. We also d...

متن کامل

scour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

Providing comprehensive control chart for monitoring of linear and nonlinear profiles using functional data analysis.

Considering profiles as functional variables, two control charts are proposed for their monitoring in phase II. Due to its conformity with the nature of real-world profiles, applying functional model leads to proposed control charts obtained through functional data analysis techniques with desired features. These include simplicity in calculation and possibility of using them for different prof...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2022

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2020.2997898