International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-10,Issue-5  ( May, 2022 )
Past issues
  1. Volume-10,Issue-4  ( Apr, 2022 )
  2. Volume-10,Issue-3  ( Mar, 2022 )
  3. Volume-10,Issue-2  ( Feb, 2022 )
  4. Volume-10,Issue-1  ( Jan, 2022 )
  5. Volume-9,Issue-12  ( Dec, 2021 )
  6. Volume-9,Issue-11  ( Nov, 2021 )
  7. Volume-9,Issue-10  ( Oct, 2021 )
  8. Volume-9,Issue-9  ( Sep, 2021 )
  9. Volume-9,Issue-8  ( Aug, 2021 )
  10. Volume-9,Issue-7  ( Jul, 2021 )

Statistics report
Aug. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 113
Paper Published : 1372
No. of Authors : 3469
  Journal Paper


Paper Title :
New Techniques for Protection of IoT Devices From Malicious Behavior using Working Set Based System Call Whitelisting and Argument Clustering

Author :Lakshmi Eswari Ponnapu Reddy, Sarat Chandra Babu Nelaturu

Article Citation :Lakshmi Eswari Ponnapu Reddy ,Sarat Chandra Babu Nelaturu , (2022 ) " New Techniques for Protection of IoT Devices From Malicious Behavior using Working Set Based System Call Whitelisting and Argument Clustering " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 23-29, Volume-10,Issue-2

Abstract : Abstract - The rapid evolution of Industry 4.0 and the spread of Internet of Things (IoT), is supporting the growth of cyber-physical systems for societal applications. It is challenging to design secure IoT devices, due to constrained computational and storage resources. The vulnerabilities in the deployed IoT devices are exploited by the attackers for carrying out malicious activities. Various anomaly detection approaches are proposed in literature for detecting malicious behavior at runtime. However they are not suitable for resource constrained IoT devices. In this paper, we propose new techniques for detecting runtime intrusions and protecting IoT devices using working set based system call whitelisting and argument clustering. Proposed system call whitelisting technique separates system call whitelists of initialization and service phases of field deployed IoT device, resulting in the reduced attack surface. We evaluated the proposed technique on Tenda AC15 version 15.03.05.19 for Telnet service. The experimental results show that the proposed working set based system call whitelisting successfully reduced 44% of system calls during the initialization phase and 40% of system calls during service phase. In addition to this, we used system call argument clustering technique, to augment the detection of malicious behavior which is injected at runtime through modifying the arguments of whitelisted system calls. Keywords - IoT Security, Malicious Behavior, Whitelisting, Working Set, Argument Clustering, Attack Surface

Type : Research paper

Published : Volume-10,Issue-2


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-18423   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 21
| Published on 2022-04-28
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY