skip to main content
10.1145/3429351.3431746acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
short-paper

Towards Autonomous Security Monitoring in Internet-of-Things Infrastructures

Published:22 December 2020Publication History

ABSTRACT

Internet of Things (IoT) infrastructures and applications are gaining increased entry into various areas of everyday life. Closely coupled to this development resilience, self-adjusting and security of such systems is experiencing a growth in popularity. Ensuring those properties sufficient monitoring and surveillance is a fundamental requirement. However, heterogeneity and complexity of IoT pose challenges traditional resilience and monitoring mechanisms are struggling to conquer with. This paper features our current and future research on a divers selection of different security and monitoring approaches adopted to the requirements of IoT with the focus on mutual support, thus, laying the foundation for autonomous security in IoT systems.

References

  1. Hassan Artail, Haidar Safa, Malek Sraj, Iyad Kuwatly, and Zaid Al-Masri. 2006. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Computers & Security 25, 4 (2006), 274--288.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Muhammet Baykara and Resul Das. 2018. A novel honeypot based security approach for real-time intrusion detection and prevention systems. Journal of Information Security and Applications 41 (2018), 103--116.Google ScholarGoogle ScholarCross RefCross Ref
  3. Christian Berger, Philipp Eichhammer, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, and Gerhard Habiger. 2020. A Survey on Resilience in the IoT: Taxonomy, Classification and Discussion of Resilience Mechanisms. In [Manuscript under Review].Google ScholarGoogle Scholar
  4. Jörg Domaschka, Christian Berger, Hans P. Reiser, Philipp Eichhammer, Frank Griesinger, Jakob Pietron, Matthias Tichy, Franz J. Hauck, and Gerhard Habiger. 2019. SORRIR: A Resilient Self-Organizing Middleware for IoT Applications [Position Paper]. In Proceedings of the 6th International Workshop on Middleware and Applications for the Internet of Things (Davis, CA, USA) (M4IoT '19). Association for Computing Machinery, New York, NY, USA, 13--16. https://doi.org/10.1145/3366610.3368098Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Philipp Eichhammer, Christian Berger, Hans P. Reiser, Jörg Domaschka, Franz J. Hauck, Gerhard Habiger, Frank Griesinger, and Jakob Pietron. 2019. Towards a Robust, Self-Organizing IoT Platform for Secure and Dependable Service Execution. In Tagungsband des FB-SYS Herbsttreffens 2019. Gesellschaft für Informatik e.V., Bonn. https://doi.org/10. 18420/fbsys2019-03Google ScholarGoogle Scholar
  6. Mohamed Faisal Elrawy, Ali Ismail Awad, and Hesham FA Hamed. 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing 7, 1 (2018), 21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zeeshan Ali Khan and Ubaid Abbasi. 2020. Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things. Electronics 9, 3 (2020), 415.Google ScholarGoogle ScholarCross RefCross Ref
  8. Hanane Lamaazi, Nabil Benamar, Antonio J Jara, Latif Ladid, and Driss El Ouadghiri. 2014. Challenges of the Internet of Things: IPv6 and Network Management. In 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, 328--333.Google ScholarGoogle Scholar
  9. Subhas Chandra Mukhopadhyay. 2014. Internet of Things, Challenges and Opportunities. Smart Sensors, Measurement and Instrumentation, Vol. 9. Springer Int. Publishing.Google ScholarGoogle Scholar
  10. Marcin Nawrocki, Matthias Wählisch, Thomas C Schmidt, Christian Keil, and Jochen Schönfelder. 2016. A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 (2016).Google ScholarGoogle Scholar
  11. Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2016. IoTPOT: A novel honeypot for revealing current IoT threats. Journal of Information Processing 24, 3 (2016), 522--533.Google ScholarGoogle ScholarCross RefCross Ref
  12. Ahmed Patel, Qais Qassim, and Christopher Wills. 2010. A survey of intrusion detection and prevention systems. Information Management & Computer Security (2010).Google ScholarGoogle Scholar
  13. Sparsh Sharma and Ajay Kaul. 2018. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular communications 12 (2018), 138--164.Google ScholarGoogle Scholar
  14. Christos Tsigkanos, Stefan Nastic, and Schahram Dustdar. 2019. Towards resilient Internet of Things: Vision, challenges, and research roadmap. In Proc. 39th IEEE International Conference on Distributed Computing Systems(ICDCS). 1754--1764. https://doi.org/10.1109/ICDCS.2019.00174Google ScholarGoogle ScholarCross RefCross Ref
  15. Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal Network and Computer Applications 84 (2017), 25--37.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Autonomous Security Monitoring in Internet-of-Things Infrastructures

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Middleware'20 Doctoral Symposium: Proceedings of the 21st International Middleware Conference Doctoral Symposium
        December 2020
        55 pages
        ISBN:9781450382007
        DOI:10.1145/3429351

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 December 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate203of948submissions,21%

        Upcoming Conference

        MIDDLEWARE '24
        25th International Middleware Conference
        December 2 - 6, 2024
        Hong Kong , Hong Kong
      • Article Metrics

        • Downloads (Last 12 months)13
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader