Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities

https://doi.org/10.1016/j.jpdc.2020.05.013Get rights and content

Abstract

With the increasing viability of Internet of Things (IoT), more devices are expected to be connected in a smart city environment. It can provide many benefits for people’s daily life, but is also susceptible to many security threats in practice. Intrusion detection systems (IDSs), especially signature-based IDSs, are one of the most commonly adopted security mechanisms to safeguard various network environments like IoT-assisted smart city against cyber attacks. The process of signature matching is a key limiting factor for a signature-based IDS, and the exclusive signature matching (ESM) was designed based on the observation that most network packets would not match any IDS signatures. However, exclusive signature matching like the single character frequency-based ESM may be vulnerable to some attacks in a hostile environment. To mitigate this issue, in this work, we propose a blockchain-enabled single character frequency-based ESM, which can build a verifiable database of malicious payloads via blockchains. In the evaluation, we investigate the performance of our approach under flooding and character padding attacks in both a simulated and a real IoT network environment. The results demonstrate the effectiveness of our approach in enhancing the robustness of single character frequency-based ESM against malicious traffic.

Introduction

With the rapidly growing number of digital devices, Internet of Things (IoT) enables these devices to be connected with each other as well as with the Internet [19]. The IoT environment involves different kinds of devices like smart sensors that can be remotely monitored and controlled. According to a report from Gartner [10], the IoT market would grow to 5.8 billion endpoints by the end of 2020, compared with an expectation of 4.8 billion IoT devices in use by 2019, resulting in a 21% increase. In addition, Statista research estimated that the global market for end-user solutions especially IoT connected electronic devices is expected to grow to 212 billion U.S. dollars in size by the end of 2019, and finally reach around 1.6 trillion by the year of 2025 [11].

The IoT can provide many benefits to people’s daily life, and it is also important to help construct smart cities. In particular, smart cities can deploy various IoT devices like connected sensors to help collect and analyze data, and improve infrastructure, e.g., public utilities and services. For example, Daintree Networks released a survey, indicating that almost 60% of building managers in the U.S. are familiar with the IoT, and 43% of them believe the IoT would shape how they operate their buildings in the next two to three years [15]. Therefore, there is an increasing trend of developing IoT-assisted smart cities, by leveraging the connection capability and intelligent technologies.

However, IoT is facing many security threats at present, making IoT-assisted smart cities vulnerable as well. According to a survey performed by i-SCOOP with over 100 IoT leaders, security threat ranks top 2 among all major IoT concerns [18]. It is easily imagined that an attacker has a chance to remotely control your front door and enter your home if your IoT controller has been compromised. Symantec’s Threat Report also reported that the overall IoT attacks around the world still remained very high in practice [48].

To defend IoT and smart cities against attacks, intrusion detection systems (IDSs) are a basic and essential security solution to help identify a variety of computer and network attacks such as worms, Trojans, DoS attacks, etc. Generally, an IDS can be classified into two categories: signature-based IDS and anomaly-based IDS. The former like Snort [41] detects an attack mainly through comparing current local or network events with its stored signatures and patterns. This kind of detection is also known as misuse detection and rule-based detection. The latter like Bro [38] attempts to figure out an intrusion by identifying a great deviation between current event and the predefined normal profiles, which is mainly used to model the normal behavior of protected assets for a period of time.

In practice, in comparison with anomaly-based approaches, signature-based detection often has a wider adoption due to its lower false alarm rate [44]. While the process of signature matching (or called string matching) is a big bottleneck, in which the workload is at least linear to the size of the target string [40]. For example, Snort is a lightweight signature-based IDS, which has the ability to perform real-time traffic analysis, content matching and packet logging on Internet Protocol (IP) networks [41], [43], [45]. It often spends abut 30 percent of its total processing power in conducting signature matching, whereas the CPU burden would be significantly increased to over 80 percent when deployed in a intensive web-traffic environment [6], [7]. This will cause Snort to drop many packets, which may cause many security risks and severely degrade the whole security level of a network.

In an IoT-assisted smart city environment, a distributed orcollaborative IDS (DIDS/CIDS) [22] can be implemented to provide better protection over a single IDS, in which there could be a set of detectors to exchange required information and data. In such environment, the detection effectiveness will be limited by the expensive signature matching. Hence there is a need to adopt a more efficient signature matching process.

Motivation. In the literature, Markatos et al. [29] first proposed an exclusion-based signature matching algorithm called ExB, in which the basic idea is to check whether an input string contains all fixed-size bit-strings of a signature. Then Meng et al. [32] extended this idea and proposed exclusive signature matching (ESM). They particularly developed a scheme of single character frequency-based ESM, which consists of four statistical tables and uses a decision algorithm to output a single character with the purpose of finding a mismatch. However, its performance may be greatly degraded under a hostile environment, i.e., an attacker can launch a character padding attack [31] by padding required characters into a forged packet.

Contributions. In recent years, blockchain technology has been widely studied in various areas especially IoT [8], [9], [42]. The use of blockchains can allow untrusted entities connecting with each other in a verifiable manner without the need of a trusted centralized entity. Due to this merit, many studies have tried to combine it with intrusion detection [23], [49]. Motivated by this, in this work, we try to combine blockchain technology with single character frequency-based ESM under IoT environments like IoT-assisted smart city. Our approach can help protect the process of signature matching in hostile environments, i.e., under character padding attack, by applying blockchains to incrementally building a verifiable database of malicious payloads. Our contributions of this work can be summarized as follows.

  • We first design a prototype on how to implement the single character frequency-based ESM in practice, and detail our blockchain-enabled single character frequency-based ESM, by integrating with blockchain technology.

  • The effectiveness of ESM is heavily based on the observation (named as PackSig observation) that the majority of network packets would not match any IDS signatures. We validate this observation in different network environments.

  • We evaluate the performance of our approach under two hostile environments, where an attacker can launch flooding attack and character padding attack to degrade the effectiveness of ESM. The results indicate that our approach can help enhance the robustness of single character frequency-based ESM under adversarial scenarios.

Roadmap. The rest of this paper is organized as follows. Section 2 introduces related studies on signature matching improvement in intrusion detection, as well as blockchain background and its applications in DIDS/CIDS. Section 3 presents the background of single character frequency-based ESM and the prototype, and introduces our proposed blockchain-enabled approach. Section 4 validates the PackSig observation under both a simulated and a real network environment. Section 5 evaluates the performance of our approach under flooding attack and character padding attack in two distributed environments. Section 6 discusses some limitations and challenges. We conclude our work and present an outlook to future work in Section 7.

Section snippets

Related work

In this section, we introduce the main literatural methods of improving signature matching process, explain the blockchain background and present relevant research studies on the combination of blockchains and collaborative intrusion detection.

Blockchain-enabled single character frequency-based ESM

In this section, we introduce the background of single character frequency-based ESM and how to implement it (with a prototype). Then we illustrate our proposed blockchain-enabled single character frequency-based ESM.

PackSig observation validation

This section aims to verify the PackSig observation under two network environments. One is a college network while the other is a company network (including about 100 personnel). The generic network structure of these environments are summarized in Fig. 4. We mainly evaluate the performance of single character frequency-based ESM in three levels: router level, server level and terminal level.

Table 1 shows the packet rate in each level for the two different network environments. It is easily

Evaluation in hostile environments

In this section, we evaluate our proposed blockchain-enabled single character frequency-based ESM in a simulated CIDS environment and a real IoT environment, in collaboration with both a healthcare center and an IT organization. The consortiumblockchain was deployed in a mid-end computer with Intel(R) Core (TM)i6, CPU 2.5 GHz with 500 GB storage. In this work, we assume that 2/3 of all nodes have to sign a block to be appended to the blockchain.

Discussion

This is an early research study on discussing how to use blockchains to benefit the signature matching process. There are some open challenges and limitations can be considered in our future work.

  • ESM scheme. This work mainly considers the single character frequency-based ESM, but adaptive character frequency-based ESM could also be a solution to improve the filtration performance. This is an interesting topic in our future work.

  • Character padding attack. In this work, we mainly consider the

Conclusion and future work

In the era of IoT, many more devices start being connected, and IoT-assisted smart cities are under development to address growing urbanization issues. To secure the smart environment, the single character frequency-based ESM can be used to improve the process of signature matching for collaborative intrusion detection. However, such ESM scheme may be vulnerable to hostile environments, i.e., under character padding attack. In this paper, we focus on this challenge and propose a

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgment

This work was partially supported by H2020-SU-ICT-03-2018: CyberSec4Europe .

Weizhi Meng is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong. He was known as Yuxin Meng and prior to joining DTU, he worked as research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as senior research associate in CityU. He won the Outstanding

References (52)

  • FiskM. et al.

    An Analysis of Fast String Matching Applied to Content-Based Forwarding and Intrusion DetectionTechnical Report CS2001-0670

    (2002)
  • GaiK. et al.

    Privacy-preserving energy trading using consortium Blockchain in smart grid

    IEEE Trans. Ind. Inf.

    (2019)
  • GaiK. et al.

    Differential privacy-based blockchain for industrial Internet-of-Things

    IEEE Trans. Ind. Inf.

    (2020)
  • Gartner says 5.8 Billion enterprise and automotive IoT endpoints will be in use in 2020

    (2020)
  • Global IoT End-User Spending Worldwide 2017-2025

    (2020)
  • T. Golomb, Y. Mirsky, Y. Elovici, CIoTA: Collaborative IoT Anomaly Detection via Blockchain, in: Proceedings of...
  • GriffinK. et al.

    Automatic generation of string signatures for malware detection

  • HorspoolR.

    Practical fast searching in strings

    Softw. Pract. Exp.

    (1980)
  • How smart city technology & the Internet of Things will change our apartments, grids and communities

    (2020)
  • HuB. et al.

    A collaborative intrusion detection approach using Blockchain for multimicrogrid systems

    IEEE Trans. Syst. Man Cybern.: Syst.

    (2019)
  • Hyperledger C open source Blockchain technologies....
  • IoT World 2019 C the issues, plans and actions of IoT executives

    (2020)
  • JavedF. et al.

    Internet of Things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review

    IEEE Commun. Surv. Tutor.

    (2018)
  • KimH. et al.

    A memory-efficient bit-split parallel string matching using pattern dividing for intrusion detection systems

    IEEE Trans. Parallel Distrib. Syst.

    (2011)
  • LiW. et al.

    Towards Blockchain-based software-defined networking: Security challenges and solutions

  • LiW. et al.

    Towards Blockchained challenge-based collaborative intrusion detection

  • Cited by (36)

    • Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

      2022, Ad Hoc Networks
      Citation Excerpt :

      The authors of [33] proposed a signature rules based network IDS for the detection of attacks. Similarly, the authors of [34] developed signature matching technique for blockchain-enabled IoT-assisted smart cities. Anomaly-based IDSs detect intrusions based on system activity profile or heuristics rather than signatures.

    • Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review

      2021, Computer Communications
      Citation Excerpt :

      Blockchain is a viable solution to handle the security issue, and little research work has been done in this direction [66]. However, various security issues have been surveyed using blockchain technology by Lin et al. [67–69]. Then, Li et al. [70] have discussed blockchain security enhancement with future research directions.

    View all citing articles on Scopus

    Weizhi Meng is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong. He was known as Yuxin Meng and prior to joining DTU, he worked as research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as senior research associate in CityU. He won the Outstanding Academic Performance Award during his doctoral study, and is a recipient of the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for Young Engineers/Researchers in both 2014 and 2017. His primary research interests are cyber security and intelligent technology in security including intrusion detection, smartphone security, biometric authentication, HCI security, cloud security, trust management, blockchain in security, cyber–physical system security and IoT security. He also shows a strong interest in applied cryptography. He is a senior member of IEEE.

    Wenjuan Li obtained the Ph.D degree from the Department of Computer Science, City University of Hong Kong (CityU) in 2019. She is currently a postdoctoral research at Hong Kong Polytechnic University, China and Technical University of Denmark, Denmark. She received both Research Tuition Scholarships and Outstanding Academic Performance Award during her doctorate studies. Before, she was a lecturer in the Department of Computer Science, Zhaoqing Foreign Language College, China, and a Research Assistant in the Department of Computer Science, CityU from 2013 to 2014. She was a Winner of Cyber Quiz and Computer Security Competition, Final Round of Kaspersky Lab “Cyber Security for the Next Generation” Conference in 2014. She also received the Best Student Paper Award from NSS 2016 and the Best Paper Award from AIBlock 2019. Her research interests include network management and security, intrusion detection, trust management, blockchain security, and E-commerce security.

    Steven Tug is an exchanged student at Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He has a broad interest in network and system security, like malware detection and smartphone security. Before, he got some programming experiences from industry.

    Jiao Tan received his master degree in computer science from the University of Hong Kong, China. He is currently a senior engineer at KOTO Research Center. His research focuses on cyber physical security and IoT security.

    A preliminary version of this paper appears in Proc. of the 17th International Conference on Information Security (ISC), Springer, pp. 465-476, October 2014 (Meng et al. 2014).

    View full text