TU Darmstadt / ULB / TUbiblio

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Conference or Workshop Item] , (2017)

Abstract

The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.

Item Type: Conference or Workshop Item
Erschienen: 2017
Creators: Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu
Title: IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Language: English
Abstract:

The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.

Title of Book: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
Publisher: IEEE
Uncontrolled Keywords: ICRI-SC
Divisions: Department of Computer Science
Department of Computer Science > System Security Lab
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Event Location: Atlanta, GA, USA
Date Deposited: 24 Apr 2017 16:53
DOI: 10.1109/ICDCS.2017.284
Identification Number: TUD-CS-2017-0095
Related URLs:
Export:

Optionen (nur für Redakteure)

View Item View Item