5. Cyber-Threat Detection in the IoT

By J. Rose, University of Portsmouth | M. Swann, University of Portsmouth | G. Bendiab, University of Portsmouth | S. Shiaeles, University of Portsmouth

Downloaded: 683 times

Published: 15 Mar 2022

© 2022 J. Rose | M. Swann | G. Bendiab | S. Shiaeles

Abstract

The Internet of Things (IoT) ecosystem is composed largely of heterogeneous internet-based devices, which generate an enormous volume of data every day; this includes sensors, smart devices, and other industrialised modules. However, the complexity of the IoT ecosystem and the quantity of IoT devices available have dramatically increased the volume of both emerging and persistent security vulnerabilities from edge to cloud computing infrastructure, principally due to security problems arising from embedded devices and other legacy hardware. Further, with the emerging IoT technologies, malware campaigns and criminal motivations are increasingly exploiting these underlying services and existing vulnerabilities. In the Cyber-Trust project, we aim to address these security issues to support the growth of the IoT ecosystem while mitigating the resulting complexity and vulnerability when protecting IoT devices. This chapter presents an overview of the IoT devices profiling and threat detection solution proposed by Cyber-Trust to tackle the grand The Internet of Things (IoT) ecosystem is composed largely of heterogeneous internet-based devices, which generate an enormous volume of data every day; this includes sensors, smart devices, and other industrialised modules. However, the complexity of the IoT ecosystem and the quantity of IoT devices available have dramatically increased the volume of both emerging and persistent security vulnerabilities from edge to cloud computing infrastructure, principally due to security problems arising from embedded devices and other legacy hardware. Further, with the emerging IoT technologies, malware campaigns and criminal motivations are increasingly exploiting these underlying services and existing vulnerabilities. In the Cyber-Trust project, we aim to address these security issues to support the growth of the IoT ecosystem while mitigating the resulting complexity and vulnerability when protecting IoT devices. This chapter presents an overview of the IoT devices profiling and threat detection solution proposed by Cyber-Trust to tackle the grand challenges of securing the IoT devices’ ecosystem. In addition, the effectiveness and performance of the proposed solution are in-depth verified, especially against botnets and Zero-day attacks.