IoT Security: Problems, Challenges and Solutions



Similar documents
IoT Security: Problems, Challenges and Solutions

Background. Liwei Ren. Trend Micro

IoT Potential Risks and Challenges

VegaStream Information Note Considerations for a VoIP installation

Topics in Network Security

ACHILLES CERTIFICATION. SIS Module SLS 1508

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Technical Note. ForeScout CounterACT: Virtual Firewall

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Brief self-introduction

Flow Analysis Versus Packet Analysis. What Should You Choose?

Internet Security Firewalls

The Advantages of a Firewall Over an Interafer

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Cisco IOS Flexible NetFlow Technology

Basic Network Configuration

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Bring Your Own Internet of Things: BYO IoT

Cheap and efficient anti-ddos solution

Introduction. The Inherent Unpredictability of IP Networks # $# #

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

VOIP TELEPHONY: CURRENT SECURITY ISSUES

Gaining Operational Efficiencies with the Enterasys S-Series

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Abstract. Introduction. Section I. What is Denial of Service Attack?

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Locking down a Hitachi ID Suite server

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Bridging the gap between COTS tool alerting and raw data analysis

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

SSL BEST PRACTICES OVERVIEW

Codes of Connection for Devices Connected to Newcastle University ICT Network

CS5008: Internet Computing

Cisco IOS Flexible NetFlow Command Reference

Using IPM to Measure Network Performance

Web App Security Audit Services

A Critical Investigation of Botnet

From Network Security To Content Filtering

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Configuring Citrix NetScaler for IBM WebSphere Application Services

NetFlow/IPFIX Various Thoughts

CompTIA Network+ (Exam N10-005)

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Client Server Registration Protocol

Denial of Service Attacks

Testing L7 Traffic Shaping Policies with IxChariot IxChariot

Introduction to Network Discovery and Identity

Firewall Testing Methodology W H I T E P A P E R

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Firewalls. Ahmad Almulhem March 10, 2012

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Secure Software Programming and Vulnerability Analysis

How To Set Up Foglight Nms For A Proof Of Concept

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Autonomous NetFlow Probe

Overview. Firewall Security. Perimeter Security Devices. Routers

Frequently Asked Questions

Application Note. Onsight Connect Network Requirements v6.3

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Web Browsing Examples. How Web Browsing and HTTP Works

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

SyncThru TM Web Admin Service Administrator Manual

Acquia Cloud Edge Protect Powered by CloudFlare

Firewalls and Intrusion Detection

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Who is Watching You? Video Conferencing Security

Denial of Service Attacks

Huawei Agile WAN Solution

Firewalls & Intrusion Detection

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Intrusion Detection in AlienVault

Steelcape Product Overview and Functional Description

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Administration guide

End-user Security Analytics Strengthens Protection with ArcSight

CSCI Firewalls and Packet Filtering

Transcription:

IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro

Background Liwei Ren Research interests Data security & privacy, network security Data compression, math modeling & algorithms Major contributions: 10+ academic publications 20+ US patents granted A security software company in Silicon Valley with successful exit. Education MS/BS in mathematics, Tsinghua University, Beijing Ph.D in mathematics, MS in information science, University of Pittsburgh Trend Micro Global security software company with headquarter in Tokyo, and R&D centers in Silicon Valley, Nanjing and Taipei; One of top security software vendors. A leader in cloud security. 2

Agenda Why do I have this sharing? IoT security: trends, problems and challenges A few security technologies & IoT Standard security protocols 3

Why do I have this sharing? I am not an expert in IoT security What? Why do you share? A new computing platform leads to new security problems & challenges and new opportunities as well! I started to investigate IoT security after RSA conference in April: Too many questions. I like to invite experts to discuss via this sharing

Why do I have this sharing? IoT security means new opportunities for a security professional like me to develop novel security solutions! 5

IoT security: trends, problems and challenges Trends (Stan Schneider Electronic Design) 6

IoT security: trends, problems and challenges Numbers: Source: Gartner Nov,2014) Internet of Things Units Installed Base by Category in Million Category 2013 2014 2015 2020 Automotive 96.0 189.6 372.3 3,511.1 Consumer 1,842.1 2,244.5 2.874.9 13,172.5 Generic Business 395.2 479.4 623.9 5,158.6 Vertical Business 698.7 836.5 1,009.4 3,164.4 Grand Total 3,032.0 3,750.0 4,880.6 25,006.6 7

IoT security: trends, problems and challenges Numbers : 8

IoT security: trends, problems and challenges Numbers : 9

IoT security: trends, problems and challenges Security cases Attack Name Lizard Stressor Linux.Darl loz Story Resource Date An attack online service hosted in Bosnia. It can convert homes and commercial routers into a zombie horde. First wide-scale hack involving television sets and at least one refrigerator. 750,000 spams were sent. Discovered a worm for devices running on Linux. An online article Proofpoint Jan 2015 Jan,2014 Symantec Nov, 2013 10

IoT security: trends, problems and challenges Problems and security challenges Many small devices have limited CPU power Not much processing power for security Need to look for new encryption scheme with less CPU power. Example: IP-addressable light bulbs. IoT will also need both encryption key management and identity management It may scale into the billions! 11

IoT security: trends, problems and challenges Problems and security challenges New devices for endpoint security New firmware, embedded OS, new software & etc. New transport protocols for network security: Much more network traffic for security analysis Bad news for large enterprises as network security is already complex and cumbersome 12

IoT security: trends, problems and challenges Seven IoT security risks: 1. Disruption and denial-of-service attacks 2. Understanding the complexity of vulnerabilities 3. IoT vulnerability management 4. Identifying, implementing security controls 5. Fulfilling the need for security analytics capabilities 6. Modular hardware and software components 7. Rapid demand in bandwidth requirement 13

IoT security: trends, problems and challenges IoT Security Top 10 (OWASP 2014): I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I4 Lack of Transport Encryption I5 Privacy Concerns I9 Insecure Software/Firmware I3 Insecure Network Services I6 Insecure Cloud Interface I7 Insecure Mobile Interface I8 Insufficient Security Configurability I10 Poor Physical Security 14

IoT security: trends, problems and challenges IoT will merge the following domains: 15

IoT security: trends, problems and challenges In the era of IoT, Do we need new concepts to describe IoT security? Do we need new security models for IoT? What is the gap between IoT security and existing security solutions? When cloud arrived, what did we do for new solutions? When smart phones and BYOD come, what did we do? What makes IoT different from the last two waves? 16

A few security technologies & IoT Simple taxonomy of IoT security 17

A few security technologies & IoT My interests for evaluation Endpoint security Vulnerability and patch management Network security Network monitoring & visibility NetFlow based security analysis 18

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA = Firmware Over The Air FOTA is a technology developed for updating the firmware of mobile phones due to software bug fixes. It uses delta encoding (aka, differential compression) technique to reduce the patch size. Delta encoding can be shown as follows conceptually: 19

A few security technologies & IoT Vulnerability and patch management with FOTA Delta encoding was used for software vulnerability management. A significant example is Google Chrome software updating powered by an very efficient delta coding algorithm Courgette We use the same concept for IoT device security. 20

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA for bug fix of mobile phones in old days, and vulnerability management as well today: 21

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA for IoT device security: 22

A few security technologies & IoT Network Security: Network monitoring & visibility NetFlow based security analysis 23

A few security technologies & IoT Network Security: monitoring & visibility with simple information: How many devices are there in this enterprise network? What kind of devices are they? Which devices transfer data which is not encrypted. Which has heavy volume of traffic? Which devices are most active? 24

A few security technologies & IoT Network Security: NetFlow based security analysis NetFlow is a router feature that collects IP network traffic as it enters or exits an interface. Version 5 collects the following values: Timestamps for the flow start and finish time, in milliseconds since the last boot. Number of bytes and packets observed in the flow source & destination IP addresses Source and destination port numbers for TCP, UDP, SCTP ICMP Type and Code. IP protocol Type of Service (ToS) value 25

A few security technologies & IoT Network Security: NetFlow based security analysis 26

Standard security protocols Why do we need a security information protocol such as OpenIOC? Describing security information Retrieving actionable security information Exchange security information between organizations Technical support for an intelligence security model How many security information protocol? OpenIOC CybOX IODEF 27

Standard security protocols What is security information? A piece of information that can be used to search for or identify potentially compromised systems. Example: IP Address / Domain Name URL File Hash Email Address X-Mailer HTTP User Agent File Mutex 28

Standard security protocols Why do I discuss these security information protocols? There are still many security vendors not using protocols for exchanging information. A best practice is encouraged! Currently, these three protocols are not unified yet. This is not good! My personal opinion: They will become even more important in the era of IoT security. 29

Q & A Thank you for your attention! Do you have questions? Email: liwei_ren@trendmicro.com Home page: https://pitt.academia.edu/liweiren 30