Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2018, Article ID 3029638, 18 pages
https://doi.org/10.1155/2018/3029638
Research Article

Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM

1Computer Science Faculty, Colombian School of Engineering Julio Garavito, Colombia
2Department of Information and Communications Engineering, University of Murcia, Spain

Correspondence should be addressed to Daniel Díaz López; oc.ude.gnialeucse@zaid.leinad

Received 28 May 2018; Revised 10 September 2018; Accepted 4 October 2018; Published 25 October 2018

Guest Editor: Constantinos Kolias

Copyright © 2018 Daniel Díaz López et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Yelamarthi, M. S. Aman, and A. Abdelgawad, “An application-driven modular IoT architecture,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 1350929, 16 pages, 2017. View at Publisher · View at Google Scholar · View at Scopus
  2. Gartner, “Gartner’s 2016 Hype Cycle for Emerging Technologies,” 2016. [Online]. Available: https://www.gartner.com/newsroom/id/3412017.
  3. S. Li, L. D. Xu, and S. Zhao, “The internet of things: a survey,” Information Systems Frontiers, vol. 17, no. 2, pp. 243–259, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Haller, S. Karnouskos, and C. Schroth, “The Internet of Things in an Enterprise Context,” in Future Internet – FIS 2008, vol. 5468 of Lecture Notes in Computer Science, pp. 14–28, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009. View at Publisher · View at Google Scholar
  5. A. Abdelgawad and K. Yelamarthi, “Internet of things (IoT) platform for structure health monitoring,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 6560797, 2017. View at Publisher · View at Google Scholar · View at Scopus
  6. B. R. Stojkoska, K. Trivodaliev, and D. Davcev, “Internet of things framework for home care systems,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 8323646, 2017. View at Publisher · View at Google Scholar · View at Scopus
  7. B. Gomes, L. Muniz, F. J. da Silva e Silva, L. E. Rios, and M. Endler, “A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living,” in Proceedings of the 2015 International Conference on Cloud Technologies and Applications (CloudTech), pp. 1–8, Marrakech, Morocco, June 2015. View at Publisher · View at Google Scholar
  8. S. Charmonman and P. Mongkhonvanit, “Special consideration for Big Data in IoE or Internet of Everything,” in Proceedings of the 13th International Conference on ICT and Knowledge Engineering, ICT and KE 2015, pp. 147–150, Thailand, November 2015. View at Scopus
  9. J. Granjal, E. Monteiro, and J. Sá Silva, “Security for the internet of things: a survey of existing protocols and open research issues,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294–1312, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Zanella, N. Bui, A. P. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for smart cities,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22–32, 2014. View at Publisher · View at Google Scholar
  11. R. Khan, S. U. Khan, and R. Zaheer, “Future internet: the internet of things architecture, possible applications and key challenges,” in Proceedings of the 10th International Conference on Frontiers of Information Technology (FIT' 12), pp. 257–260, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. V. Beltran, A. F. Skarmeta, and P. M. Ruiz, “An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 3859836, 13 pages, 2017. View at Publisher · View at Google Scholar
  13. Y. H. Hwang, “IoT security & privacy: Threats and challenges,” in Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, IoTPTS 2015, p. 1, Singapore. View at Scopus
  14. F. Gómez Mármol, M. Gil Pérez, and G. Martínez Pérez, “I Don’t Trust ICT: Research Challenges in Cyber Security,” in Trust Management X, vol. 473 of IFIP Advances in Information and Communication Technology, pp. 129–136, Springer International Publishing, Cham, 2016. View at Publisher · View at Google Scholar
  15. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: the road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. I. Yaqoob, E. Ahmed, M. H. U. Rehman et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Computer Networks, vol. 129, pp. 444–458, 2017. View at Publisher · View at Google Scholar · View at Scopus
  17. D. S. Lavrova, “An approach to developing the SIEM system for the Internet of Things,” Automatic Control and Computer Sciences, vol. 50, no. 8, pp. 673–681, 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Zegzhda, D. Zegzhda, M. Kalinin, A. Pechenkin, A. Minin, and D. Lavrova, “Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing,” in Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016, pp. 81–87, USA, July 2016. View at Scopus
  19. G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, “Smart locks: Lessons for securing commodity internet of things devices,” in Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2016, pp. 461–472, Xi'an, China, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Woschek, “Owasp cheat sheets,” pp, vol. 315, p. 4, 2015, https://www.owasp.org/images/9/9a/OWASP_Cheatsheets_Book.pdf. View at Google Scholar
  21. ISO/IEC, “ISO/IEC 27032:2012 - Information technologyâ”Security techniquesâ”Guidelines for cybersecurity,” https://www.iso.org/standard/44375.html, 2012.
  22. C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: mirai and other botnets,” IEEE Computer Society, vol. 50, no. 7, pp. 80–84, 2017. View at Publisher · View at Google Scholar
  23. A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proceedings of the 52nd ACM/EDAC/IEEE Design Automation Conference (DAC '15), pp. 1–6, IEEE, San Francisco, Calif, USA, June 2015. View at Publisher · View at Google Scholar
  24. A. O. Prokofiev, Y. S. Smirnova, and V. A. Surov, “A method to detect Internet of Things botnets,” in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 105–108, Moscow, January 2018. View at Publisher · View at Google Scholar
  25. V. Adat and B. B. Gupta, “Security in Internet of Things: issues, challenges, taxonomy, and architecture,” Telecommunication Systems, vol. 67, no. 3, pp. 423–441, 2018. View at Publisher · View at Google Scholar · View at Scopus
  26. ISO/IEC, “ISO/IEC 27000:2018 - Information technology-Security techniques-Information security management systems-Overview and vocabulary,” https://www.iso.org/standard/73906.html, 2018.
  27. S. Gupta, B. S. Chaudhari, and B. Chakrabarty, “Vulnerable network analysis using war driving and Security intelligence,” in Proceedings of the 2016 International Conference on Inventive Computation Technologies, ICICT 2016, India, August 2016. View at Scopus
  28. J. R Vacca, Network and system security, S. Elliot, Ed., Syngress - Elsevier, 2014.
  29. Y. Chahid, M. Benabdellah, and A. Azizi, “Internet of things security,” in Proceedings of the 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems, WITS 2017, Morocco, April 2017. View at Scopus
  30. R. Van Rijswijk and E. Poll, “Using trusted execution environments in two–factor authentication: comparing approaches,” ser. Lecture Notes in Informatics. 1em plus 0.5em minus 0.4em Bonn, Germany: Gesellschaft for Informatik, 9 2013, pp. 20–31.
  31. C. Doukas, I. Maglogiannis, V. Koufi, F. Malamateniou, and G. Vassilacopoulos, “Enabling data protection through PKI encryption in IoT m-Health devices,” in Proceedings of the 12th IEEE International Conference on BioInformatics and BioEngineering, BIBE 2012, pp. 25–29, November 2012. View at Scopus
  32. W.-I. Bae and J. Kwak, “Smart card-based secure authentication protocol in multi-server IoT environment,” Multimedia Tools and Applications, pp. 1–19, 2017. View at Google Scholar · View at Scopus
  33. B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017. View at Publisher · View at Google Scholar · View at Scopus
  34. W. Meng, “Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling,” The Computer Journal, vol. 51, no. 7, pp. 36–43, 2018. View at Publisher · View at Google Scholar
  35. I. Smith and D. Bailey, “IoT Security Guidelines for Endpoint Ecosystem,” GSM Association, Tech. Rep., 2016. [Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2016/02/CLP.13-v1.0.pdf.
  36. P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, “Demo: An ids framework for internet of things empowered by 6lowpan,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, pp. 1337–1340, 2013.
  37. P. Nespoli and F. Gómez Mármol, “e-Health Wireless IDS with SIEM integration,” in IEEE Wireless Communications and Networking Conference (WCNC’18), Barcelona, Spain, 2018.
  38. A. Sforzin, F. G. Marmol, M. Conti, and J. Bohli, “RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT,” in Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), pp. 440–448, Toulouse, France, July 2016. View at Publisher · View at Google Scholar
  39. I. Kotenko and A. Chechulin, “Computer attack modeling and security evaluation based on attack graphs,” in Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS 2013, pp. 614–619, Germany, September 2013. View at Scopus
  40. I. Kotenko and A. Chechulin, “Common Framework for Attack Modeling and Security Evaluation in SIEM Systems,” in Proceedings of the 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp. 94–101, Besancon, France, November 2012. View at Publisher · View at Google Scholar
  41. G. Kambourakis, C. Kolias, and A. Stavrou, “The Mirai botnet and the IoT Zombie Armies,” in Proceedings of the 2017 IEEE Military Communications Conference, MILCOM 2017, pp. 267–272, USA, October 2017. View at Scopus
  42. D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, “Security and privacy issues for an IoT based smart home,” in Proceedings of the 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2017, pp. 1292–1297, Croatia, May 2017. View at Scopus
  43. Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “IoT security: ongoing challenges and research opportunities,” in Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications (SOCA '14), pp. 230–234, IEEE, Matsue, Japan, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  44. I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. Ullah Khan, “The rise of ‘big data’ on cloud computing: review and open research issues,” Information Systems, vol. 47, pp. 98–115, 2015. View at Publisher · View at Google Scholar · View at Scopus
  45. G. Shpantzer, “Implementing hardware roots of trust: The trusted platform module comes of age,” SANS Whitepaper, 2013. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/SANS-Implementing-Hardware-Roots-of-Trust.pdf.
  46. S. A. Mirheidari, S. Arshad, and R. Jalili, “Alert Correlation Algorithms: A Survey and Taxonomy,” in Cyberspace Safety and Security, vol. 8300 of Lecture Notes in Computer Science, pp. 183–197, Springer International Publishing, Cham, 2013. View at Publisher · View at Google Scholar
  47. P. Cichonski, T. Millar, T. Grance, and K. Scarfone, “Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology,” National Institute of Standards and Technology NIST SP 800-61r2, 2012. View at Publisher · View at Google Scholar
  48. D. Díaz-López, G. Dólera-Tormo, F. Gómez-Mármol, and G. Martínez-Pérez, “Dynamic counter-measures for risk-based access control systems: An evolutive approach,” Future Generation Computer Systems, vol. 55, pp. 321–335, 2016. View at Publisher · View at Google Scholar
  49. P. Nespoli, D. Papamartzivanos, F. G. Marmol, and G. Kambourakis, “Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks,” IEEE Communications Surveys & Tutorials, 2017. View at Google Scholar · View at Scopus
  50. P. H. Gregory, ISSP guide to security essentials, vol. 12, Cengage Learning, 2014.
  51. Alienvault, “Insider’s guide to Incident Response,” https://www.alienvault.com/resource-center/ebook/insider-guide-to-incident-response-download, 2017.
  52. E. Tittle, J. M. Stewart, and M. Chapple, CISSP: Certified Information Systems Security Professional Study Guide, vol. 7, John Wiley Sons, 2012.
  53. S. Perumal, N. Md Norwawi, and V. Raman, “Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology,” in Proceedings of the 5th International Conference on Digital Information Processing and Communications, ICDIPC 2015, pp. 19–23, Switzerland, October 2015. View at Scopus
  54. RSA, “Two-Factor Authentication Is a Must for Mobile,” 2016. [Online]. Available: https://www.rsa.com/en-us/blog/2016-06/two-factor-authentication-is-a-must-for-mobile.
  55. A. Soro, A. H. Ambe, and M. Brereton, “Minding the gap: Reconciling human and technical perspectives on the IoT for healthy ageing,” Wireless Communications and Mobile Computing, vol. 2017, 2017. View at Google Scholar · View at Scopus