Self-descriptive devices for an Intrusion Detection and ...

25 downloads 2893 Views 3MB Size Report
Authorization config. inspired by Facebook apps and Google Play Store. Monitoring. Monitoring of e.g. communication or alerts. Alerts. Alerts by e.g. Intrusion de-.
Self-descriptive devices for a Policy Enforcement System

Self-descriptive devices for an Intrusion Detection and Prevention System Characteristics

What’s new

Challenges

Solutions

   

Network IDS/IPS Traffic whitelisting for Smart Home gadgets Implemented on router Self-describing Smart Home devices

Characteristics

 Two-factor characterization of Smart Home devices via self-description and external databases  Negative Anomaly-Signature-based IDS/IPS 1. 2. 3. 4.

Who describes the „normal“ state of network traffic? How to describe the „normal“ state of network traffic? How to monitor the traffic? How can an autonomous, user-friendly configuration and operation be ensured?

1. Compare traffic characteristics of self-described devices and external knowledge databases (two-factor characterization) 2. Based on traffic signatures 3. With a network IDS/IPS, implemented on the router 4. With a smartphone application

What’s new

Challenges

Solutions

 Policy Enforcement  Implemented on router  Profiling of Smart Home devices and device classes and/or self-describing Smart Home devices  Two-factor characterization of Smart Home devices via self-description and external databases  Profiling of Smart Home devices for Policy Enforcement 1. 2. 3. 4.

Who describes the policies? How to describe the policies? How to enforce the policies? How can an autonomous, user-friendly configuration and operation be ensured?

1. Compare traffic characteristics of self-described devices and external knowledge databases (two-factor characterization) 2. With rules, designed for devices and device classes 3. With rules, stored on the router and enforced by it 4. With a Smartphone application

Secure Smart Home

Envisioned Smart Home Architecture

Implications

Assumptions

Interaction of system components

 Traffic of Smart Home gadgets increases  Network traffic can be described more exactly  IDS/IDS and Policy Enforcement get more efficient

WiFi-HN

 Devices are connected via WiFi  Legacy & proprietary devices integrated via Gateways  Self-descriptive devices for an Intrusion Detection and Prevention System  Self-descriptive devices for a Policy Enforcement System  User-friendly smartphone app for administration

Detection & Prevention

Enforcement

IDPS IDPS Administration

PE

App

Administration

Legend App: Application HN: Home Network PE: Policy Enforcement IDPS: Intrusion Detection and Prevention System

Configuration

Monitoring

Alerts

Authorization config. inspired by Facebook apps and Google Play Store

Monitoring of e.g. communication or alerts

Alerts by e.g. Intrusion detection or if authorization config. does not match

Challenge: Easy to use

Challenge: Clear representation

Challenge: Discreet

Lukas Braun ([email protected]) Prof. Dr. Hans-Joachim Hof ([email protected])

Suggest Documents