skip to main content
10.1145/3546037.3546060acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster

P4Pir: in-network analysis for smart IoT gateways

Published:25 October 2022Publication History

ABSTRACT

IoT gateways are vital to the scalability and security of IoT networks. As more devices connect to the network, traditional hard-coded gateways fail to flexibly process diverse IoT traffic from highly dynamic devices. This calls for a more advanced analysis solution. In this work, we present P4Pir, an in-network traffic analysis solution for IoT gateways. It utilizes programmable data planes for in-band traffic learning with self-driven machine learning model updates. Preliminary results show that P4Pir can accurately detect emerging attacks based on retraining and updating the machine learning model.

References

  1. Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 265--283.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, and David Walker. 2014. P4: Programming Protocol-Independent Packet Processors. SIGCOMM Comput. Commun. Rev. 44, 3 (jul 2014), 87--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Coralie Busse-Grawitz, Roland Meier, Alexander Dietmüller, Tobias Bühler, and Laurent Vanbever. 2019. pForest: In-network inference with random forests. arXiv (2019). arXiv:1909.05680Google ScholarGoogle Scholar
  4. Mojtaba Eskandari, Zaffar Haider Janjua, Massimo Vecchio, and Fabio Antonelli. 2020. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices. IEEE Internet of Things Journal 7, 8 (2020), 6882--6897. Google ScholarGoogle ScholarCross RefCross Ref
  5. Yong Feng, Zhikang Chen, Haoyu Song, Wenquan Xu, Jiahao Li, Zijian Zhang, Tong Yun, Ying Wan, and Bin Liu. 2022. Enabling In-situ Programmability in Network Data Plane: From Architecture to Language. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 635--649.Google ScholarGoogle Scholar
  6. Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, and Helge Janicke. 2022. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning. Google ScholarGoogle ScholarCross RefCross Ref
  7. Ibbad Hafeez, Markku Antikainen, Aaron Yi Ding, and Sasu Tarkoma. 2020. IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Transactions on Network and Service Management 17, 1 (2020).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. 2017. Transcend: Detecting Concept Drift in Malware Classification Models. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 625--642.Google ScholarGoogle Scholar
  9. Tran Viet Khoa, Yuris Mulya Saputra, Dinh Thai Hoang, Nguyen Linh Trung, Diep Nguyen, Nguyen Viet Ha, and Eryk Dutkiewicz. 2020. Collaborative learning model for cyberattack detection systems in iot industry 4.0. In 2020 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, and Hamed Haddadi. 2020. The Case for Retraining of ML Models for IoT Device Identification at the Edge. CoRR abs/2011.08605 (2020). arXiv:2011.08605 https://arxiv.org/abs/2011.08605Google ScholarGoogle Scholar
  11. Sándor Laki, Radostin Stoyanov, Dávid Kis, Robert Soulé, Péter Vörös, and Noa Zilberman. 2021. P4Pi: P4 on Raspberry Pi for Networking Education. SIGCOMM Comput. Commun. Rev. 51, 3 (2021). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. February (2018), 18--21. arXiv:1802.09089 Google ScholarGoogle ScholarCross RefCross Ref
  13. Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, and Hassan Habibi Gharakheili. 2021. Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks. In 2021 IEEE 46th Conference on Local Computer Networks (LCN). 57--64. Google ScholarGoogle ScholarCross RefCross Ref
  14. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019).Google ScholarGoogle Scholar
  15. Arunan Sivanathan, Hassan Habibi Gharakheili, and Vijay Sivaraman. 2020. Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning. IEEE Transactions on Network and Service Management 17, 1 (2020), 60--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Radostin Stoyanov, Adam Wolnikowski, Robert Soulé, Sándor Laki, and Noa Zilberman. 2021. Building an Internet Router with P4Pi (EuroP4 '21). ACM, New York, NY, USA, 151--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah. 2021. MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 4205--4222.Google ScholarGoogle Scholar
  18. Qiao Yan, Wenyao Huang, Xupeng Luo, Qingxiang Gong, and F. Richard Yu. 2018. A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things. IEEE Communications Magazine 56, 2 (2018), 30--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Changgang Zheng, Zhaoqi Xiong, Thanh T Bui, Siim Kaupmees, Riyad Bensoussane, Antoine Bernabeu, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman. 2022. IIsy: Practical In-Network Classification. Google ScholarGoogle ScholarCross RefCross Ref
  20. Changgang Zheng, Mingyuan Zang, Xinpeng Hong, Riyad Bensoussane, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman. 2022. Automating In-Network Machine Learning. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. P4Pir: in-network analysis for smart IoT gateways

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SIGCOMM '22: Proceedings of the SIGCOMM '22 Poster and Demo Sessions
            August 2022
            69 pages
            ISBN:9781450394345
            DOI:10.1145/3546037

            Copyright © 2022 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 October 2022

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            Overall Acceptance Rate554of3,547submissions,16%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader