Self-descriptive devices for a Policy Enforcement System
Self-descriptive devices for an Intrusion Detection and Prevention System Characteristics
What’s new
Challenges
Solutions
Network IDS/IPS Traffic whitelisting for Smart Home gadgets Implemented on router Self-describing Smart Home devices
Characteristics
Two-factor characterization of Smart Home devices via self-description and external databases Negative Anomaly-Signature-based IDS/IPS 1. 2. 3. 4.
Who describes the „normal“ state of network traffic? How to describe the „normal“ state of network traffic? How to monitor the traffic? How can an autonomous, user-friendly configuration and operation be ensured?
1. Compare traffic characteristics of self-described devices and external knowledge databases (two-factor characterization) 2. Based on traffic signatures 3. With a network IDS/IPS, implemented on the router 4. With a smartphone application
What’s new
Challenges
Solutions
Policy Enforcement Implemented on router Profiling of Smart Home devices and device classes and/or self-describing Smart Home devices Two-factor characterization of Smart Home devices via self-description and external databases Profiling of Smart Home devices for Policy Enforcement 1. 2. 3. 4.
Who describes the policies? How to describe the policies? How to enforce the policies? How can an autonomous, user-friendly configuration and operation be ensured?
1. Compare traffic characteristics of self-described devices and external knowledge databases (two-factor characterization) 2. With rules, designed for devices and device classes 3. With rules, stored on the router and enforced by it 4. With a Smartphone application
Secure Smart Home
Envisioned Smart Home Architecture
Implications
Assumptions
Interaction of system components
Traffic of Smart Home gadgets increases Network traffic can be described more exactly IDS/IDS and Policy Enforcement get more efficient
WiFi-HN
Devices are connected via WiFi Legacy & proprietary devices integrated via Gateways Self-descriptive devices for an Intrusion Detection and Prevention System Self-descriptive devices for a Policy Enforcement System User-friendly smartphone app for administration
Detection & Prevention
Enforcement
IDPS IDPS Administration
PE
App
Administration
Legend App: Application HN: Home Network PE: Policy Enforcement IDPS: Intrusion Detection and Prevention System
Configuration
Monitoring
Alerts
Authorization config. inspired by Facebook apps and Google Play Store
Monitoring of e.g. communication or alerts
Alerts by e.g. Intrusion detection or if authorization config. does not match
Challenge: Easy to use
Challenge: Clear representation
Challenge: Discreet
Lukas Braun (
[email protected]) Prof. Dr. Hans-Joachim Hof (
[email protected])