By the same authors

A Signature-based Intrusion Detection System for the Internet of Things

Research output: Contribution to conferencePaperpeer-review

Standard

A Signature-based Intrusion Detection System for the Internet of Things. / Ioulianou, Philokypros; Vasilakis, Vasileios; Moscholios, Ioannis; Logothetis, Michael.

2018. Paper presented at Information and Communication Technology Form , Graz, Austria.

Research output: Contribution to conferencePaperpeer-review

Harvard

Ioulianou, P, Vasilakis, V, Moscholios, I & Logothetis, M 2018, 'A Signature-based Intrusion Detection System for the Internet of Things', Paper presented at Information and Communication Technology Form , Graz, Austria, 11/07/18 - 13/07/18.

APA

Ioulianou, P., Vasilakis, V., Moscholios, I., & Logothetis, M. (Accepted/In press). A Signature-based Intrusion Detection System for the Internet of Things. Paper presented at Information and Communication Technology Form , Graz, Austria.

Vancouver

Ioulianou P, Vasilakis V, Moscholios I, Logothetis M. A Signature-based Intrusion Detection System for the Internet of Things. 2018. Paper presented at Information and Communication Technology Form , Graz, Austria.

Author

Ioulianou, Philokypros ; Vasilakis, Vasileios ; Moscholios, Ioannis ; Logothetis, Michael. / A Signature-based Intrusion Detection System for the Internet of Things. Paper presented at Information and Communication Technology Form , Graz, Austria.6 p.

Bibtex - Download

@conference{7ceb4d922f8e4d08963a1f9ecaec8fb8,
title = "A Signature-based Intrusion Detection System for the Internet of Things",
abstract = "Internet of Things (IoT) is envisioned as a transformative approach with a wide range of applications in various sectors such as home automation, industrial control, and agriculture. It promises innovative business models and improved user experience. However, as evidenced by recent attacks such as the Mirai botnet, IoT networks and systems remain very vulnerable and require stronger protection mechanisms. Furthermore, due to processing, memory, and power constraints of typical IoT devices, traditional Internet security mechanisms are not always feasible or appropriate. In this work, we are concerned with designing an Intrusion Detection System (IDS) for protecting IoT networks from external threats as well as internal compromised devices. Our proposed design adopts a signature-based intrusion detection approach and involves both certralised and distributed IDS modules. Using the Cooja simulator, we have implementeda Denial of Service (DoS) attack scenario on IoT devices. This scenario exploits the RPL protocol, which is widely used for routing in low-power networks, including IoT networks. In particular, we have implemented two variants of DoS attacks, namely “Hello” flooding and version number modification. As shown by simulation results, these attacks may impact the reachability of certain IoT devices and their power consumption.",
keywords = "Internet of things, intrusion detection, Contiki OS, denial of service",
author = "Philokypros Ioulianou and Vasileios Vasilakis and Ioannis Moscholios and Michael Logothetis",
year = "2018",
month = jun,
day = "8",
language = "English",
note = "Information and Communication Technology Form , ICTF ; Conference date: 11-07-2018 Through 13-07-2018",
url = "http://ictf2018.ieice-europe.org/",

}

RIS (suitable for import to EndNote) - Download

TY - CONF

T1 - A Signature-based Intrusion Detection System for the Internet of Things

AU - Ioulianou, Philokypros

AU - Vasilakis, Vasileios

AU - Moscholios, Ioannis

AU - Logothetis, Michael

PY - 2018/6/8

Y1 - 2018/6/8

N2 - Internet of Things (IoT) is envisioned as a transformative approach with a wide range of applications in various sectors such as home automation, industrial control, and agriculture. It promises innovative business models and improved user experience. However, as evidenced by recent attacks such as the Mirai botnet, IoT networks and systems remain very vulnerable and require stronger protection mechanisms. Furthermore, due to processing, memory, and power constraints of typical IoT devices, traditional Internet security mechanisms are not always feasible or appropriate. In this work, we are concerned with designing an Intrusion Detection System (IDS) for protecting IoT networks from external threats as well as internal compromised devices. Our proposed design adopts a signature-based intrusion detection approach and involves both certralised and distributed IDS modules. Using the Cooja simulator, we have implementeda Denial of Service (DoS) attack scenario on IoT devices. This scenario exploits the RPL protocol, which is widely used for routing in low-power networks, including IoT networks. In particular, we have implemented two variants of DoS attacks, namely “Hello” flooding and version number modification. As shown by simulation results, these attacks may impact the reachability of certain IoT devices and their power consumption.

AB - Internet of Things (IoT) is envisioned as a transformative approach with a wide range of applications in various sectors such as home automation, industrial control, and agriculture. It promises innovative business models and improved user experience. However, as evidenced by recent attacks such as the Mirai botnet, IoT networks and systems remain very vulnerable and require stronger protection mechanisms. Furthermore, due to processing, memory, and power constraints of typical IoT devices, traditional Internet security mechanisms are not always feasible or appropriate. In this work, we are concerned with designing an Intrusion Detection System (IDS) for protecting IoT networks from external threats as well as internal compromised devices. Our proposed design adopts a signature-based intrusion detection approach and involves both certralised and distributed IDS modules. Using the Cooja simulator, we have implementeda Denial of Service (DoS) attack scenario on IoT devices. This scenario exploits the RPL protocol, which is widely used for routing in low-power networks, including IoT networks. In particular, we have implemented two variants of DoS attacks, namely “Hello” flooding and version number modification. As shown by simulation results, these attacks may impact the reachability of certain IoT devices and their power consumption.

KW - Internet of things

KW - intrusion detection

KW - Contiki OS

KW - denial of service

M3 - Paper

T2 - Information and Communication Technology Form

Y2 - 11 July 2018 through 13 July 2018

ER -