SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our...

9
An Edge-ISP Collaborative Architecture for IoT Security SIOTOME IoTSec 2018, April 17 th 2018 Joint work with: Vassilis Christophides, Renata Teixeira, Kenjiro Cho, Shigeya Suzuki, Adrian Perrig Hamed Haddadi

Transcript of SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our...

Page 1: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

An Edge-ISP Collaborative Architecture for IoT Security

SIOTOME

IoTSec 2018, April 17th 2018

Joint work with: Vassilis Christophides, Renata Teixeira, Kenjiro Cho, Shigeya Suzuki, Adrian Perrig

Hamed Haddadi

Page 2: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

IoT devices are entering our homes.

Page 3: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

They generate lots of data, hard to classify!

2

Yousef Amar, Hamed Haddadi, Richard Mortier, Anthony Brown, James Colley, Andy Crabtree, “An Analysis of Home IoT Network Traffic and Behaviour”, Available on ArXiv, March 2018.

Fig. 1. An Overview of the Home IoT Testbed

7 Samsung SmartThings Hub with a presence sensor8 Neato Botvac vacuum cleaner9 2x TP-Link smart plugs

10 Philips Hue Bridge11 Apple TV12 Ubiquiti Access Point13 DLink Switch14 TP Link MR6400

These include a variety of general-purpose home hubs ( 3 ,7 ), as well as device-specific hubs ( 10 , 11 ) that are one step

away from the devices they actually control, such as severalHue LED bulbs.

We also have a number of consumer electronics connected( 4 , 5 , 6 ), while our two smart plugs ( 9 ) can accommodateany additional offline devices. Finally, we have IoT devicesthat connect directly to the router ( 1 , 8 , 2 ).

B. Set-up

This section describes how we set up our home IoT testbed.Our measurements and analysis is conducted on network trafficwhile all devices are idle. We connect an L2 switch to a 4Grouter running NAT, DHCP, and DNS forwarding to Google’sDNS. An access point is connected to this switch to which allbut two of the IoT devices are connected. These two have awired connections directly to the from two of our IoT devices.

We capture all traffic by mirroring all ports to one connectedto a Linux box with two NICs. Traffic is captured via one NIC

with TCP/UDP disabled through tcpdump and stored on disk.Traces are then retrieved separately through SSH via a secondNIC connected to the internet. All data must pass through theswitch (both internal and external) and thus all packets aremirrored on the switch port to the Linux box and therefore allpackets are captured.

C. Data and Analysis

We continuously captured packets for 22 days before per-forming our first analysis of this data. We wrote a set ofscripts to perform our analysis, and are making these scriptspublicly available [5]. To analyze network behavior on a per-device basis, we split the combined trace by MAC address. Wealso used DNS and DHCP logs to help find hostnames thatcorrespond to MAC addresses by looking at mappings of IPto MAC address and IP to hostname over time. This is usefulespecially for devices that randomize their MAC addresses,such as the iPad.

For all other statistics, we fed the traces through the BroNetwork Security Monitor [6] and ran custom as well asexisting scripts on Bro logs.

III. OBSERVATIONS

A. Device Setup and Interaction

The devices were set up using the manufacturers apps andset up with Apple HomeKit where possible. If a device could

Page 4: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

They generate lots of data, hard to classify!

Yousef Amar, Hamed Haddadi, Richard Mortier, Anthony Brown, James Colley, Andy Crabtree, “An Analysis of Home IoT Network Traffic and Behaviour”, Available on ArXiv, March 2018.

Fig. 2. Bytes transmitted per device split by protocol and service

0 M

200 M

400 M

600 M

800 M

2x T

P Li

nk H

S110

Amaz

on E

cho

Appl

e TV

Broa

dcas

tD

Link

Sw

itch

Foob

otH

ue B

ridge

iPho

ne 5

sJa

mes

' iPad

Mul

ticas

tN

eato

Rob

ot V

acSm

artT

hing

s H

ubU

biqu

iti A

cces

s Po

int

WIN

C−7

0−21

Device

Traf

fic (b

ytes

)

typeexternalinternal

Fig. 3. Internal vs external traffic; internal traffic separated for visibility

Page 5: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

Is ISP side monitoring enough?

• Too much data, too late?

• Firewalls, NATs, middleboxes, proxies affecting the quality ofthe data

• Visibility into WAN and coordinated attacks, but no visibilityinto particulars of the devices.

Page 6: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

Can we rely on the edge?• Smart devices, dumb defaults (enough has been said today!)• firewalls and intrusion detection/prevention systems• end-host based defenses (e.g., antivirus)• However: Devices are getting more & more powerful

Challenges:• Coordination across devices• Patching and updates• Unavailability of technical operators

Page 7: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

ISP cloud

SIOTOME/cloudSIOTOME/edge

home gatewayIoT devices

Internet

access ISP

access ISP

data collector

analytics

controller

cross-domaincontrol

SIOTOME system blocks

knowledge exchange

customer data

edge/cloud coop

Fig. 1. SIOTOME Architecture and System Components

• The Cloud collector is the software system that col-lects reports from home collectors as well as per-forms additional monitoring at the ISP level (whenSIOTOME/cloud is running in the ISP), so it can ob-serve malicious patterns that span several customers.

• The Cloud analyzer is similar to the edge analyzer inthat it analyses network traffic to identify threats. Themethods running in the cloud analyzer benefit from thelarge volume of data coming from multiple homes andISP traffic. It is responsible for collecting the deviceprofiles learned across homes into a central databaseas well as for populating this database with signaturesof attacks it discovers or learns from edge analyzers.

• The Cloud controller is an SDN controller that cansteer local network traffic at the ISP level and triggercountermeasures to the threats identified by the cloudanalyzer.

• The cross-domain controller steers traffic betweendomains. It can make a destination reachable fromonly a subset of sources or ensure that outgoing trafficstays within a selected network region.

• The secure communication component maintains se-cure communication between various SIOTOME com-ponents.

SIOTOME allows for delegating parts of such securityfunctionality from the cloud to the edge, enabled by a com-mon framework called SIOTOME/cloud and SIOTOME/edge.It aims to balance local learning/defense and global learn-ing/defense, and to quickly propagate detected threat infor-mation among users. The SIOTOME/edge in a user’s homeadapts to individual user environments, and provides front-enddefense mechanisms close to IoT devices. It also preserves

user privacy by processing sensitive data locally without ex-posing them to a third-party [5]. We rely on the home gatewayarchitectures such as the Databox system [14], where privacy-preserving IoT and sensor data analytics can be performedusing containerized libraries and isolated data sources, whileminimizing the risk of sensitive inferences from third partiesand the ISP [13], [12]. Collaborative and hybrid machinelearning frameworks have recently been developed, leveragingedge processing to aid in preserving privacy, and increasingthe resource efficiency of IoT systems [7], [16].

The SIOTOME/cloud in the access ISP has a more globalview by collecting and analyzing data from a large numberof customers, as well as exchanging knowledge informationwith SIOTOME/clouds in other ISPs. It also provides back-end defense mechanisms for isolating individual customers andfor cross-domain communications. The SIOTOME/cloud andSIOTOME/edge can run the same set of security primitives,although the edge has only limited resources. A specific secu-rity service is composed by chaining security primitives; eachsecurity primitive can be dynamically created, deleted, or mi-grated between the SIOTOME/cloud and the SIOTOME/edge.

Finally, SIOTOME makes extensive use of network slicingfor isolating IoT device communications; devices are groupedby attributes and observed behaviors, and then, assigned toa network slice with a specific security policy. SIOTOMEwill rely on intra- and cross-domain network environmentsthat only permit approved network communications, whichwe call permissioned network input and output. Intra-domainmechanisms will rely on a technique called SDN-basedhome network steering that whitelists communication betweengroups of devices and devices and external entities (i.e., web-sites) in network-isolated slices, leveraging the Majord’Homeplatform [3], [4]. For cross-domain mechanisms, we planto leverage the SCION secure Internet architecture [17], an

3

Architecture

https://haddadi.github.io/privacy-preserving-edge-computing/https://haddadi.github.io/Privacy-Preserving-Sensory-Analysis/

Page 8: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

First steps…

Utility Privacy

Cost

• Get enough attack data from events• Set up a testbed and train models in a federated way• Establish lightweight models on the edge• Set up private feature sharing scheme with the ISP• Establish utility, privacy, and cost bounds

Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, HamedHaddadi, “Private and Scalable Personal Data Analytics using a Hybrid Edge-CloudDeep Learning”, IEEE Computer, Special Issue on Mobile and Embedded DeepLearning, April 2018.

Page 9: SIOTOME - Hamed Haddadi · This section describes how we set up our home IoT testbed. Our measurements and analysis is conducted on network traffic while all devices are idle. We

https://haddadi.github.io/

[email protected]

@realhamed

Thank You!

SIOTOME: An Edge-ISP Collaborative Architecture for IoT Security