IoT Security: Problems, Challenges and Solutions



Similar documents
IoT Security: Problems, Challenges and Solutions

Background. Liwei Ren. Trend Micro

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Brief self-introduction

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

ACHILLES CERTIFICATION. SIS Module SLS 1508

Topics in Network Security

IoT Potential Risks and Challenges

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

The Advantages of a Firewall Over an Interafer

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

VegaStream Information Note Considerations for a VoIP installation

Abstract. Introduction. Section I. What is Denial of Service Attack?

Technical Note. ForeScout CounterACT: Virtual Firewall

Web App Security Audit Services

Information Security Services

Codes of Connection for Devices Connected to Newcastle University ICT Network

Great ideas, big data and little privacy? Bart Preneel iminds and COSIC KU Leuven

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Who is Watching You? Video Conferencing Security

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Bring Your Own Internet of Things: BYO IoT

Cisco & Big Data Security

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Symantec Client Management Suite 8.0

What is Really Needed to Secure the Internet of Things?

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Security and the Internet of Things

Basic Network Configuration

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

12 Security Camera System Best Practices - Cyber Safe

CRYPTUS DIPLOMA IN IT SECURITY

End-user Security Analytics Strengthens Protection with ArcSight

8 Steps for Network Security Protection

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

8 Steps For Network Security Protection

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Flow Analysis Versus Packet Analysis. What Should You Choose?

McAfee Endpoint Protection Products

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Bridging the gap between COTS tool alerting and raw data analysis

Locking down a Hitachi ID Suite server

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Internet Security Firewalls

What someone said about junk hacking

CS5008: Internet Computing

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Secure Software Programming and Vulnerability Analysis

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Steelcape Product Overview and Functional Description

Network Monitoring Tool to Identify Malware Infected Computers

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Attacks from the Inside

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Cheap and efficient anti-ddos solution

Introduction. The Inherent Unpredictability of IP Networks # $# #

Cyber-Security Risk in the Global Organization:

ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

VOIP TELEPHONY: CURRENT SECURITY ISSUES

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Industrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital

Malicious Network Traffic Analysis

CS 356 Lecture 16 Denial of Service. Spring 2013

Client Server Registration Protocol

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Overview. Firewall Security. Perimeter Security Devices. Routers

DDoS Protection Technology White Paper

How To Protect Your Data From Being Stolen

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Devising a Server Protection Strategy with Trend Micro

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

COSC 472 Network Security

Introduction to Network Discovery and Identity

Exactly the Same, but Different

Network Incident Report

Firewalls and Software Updates

A Critical Investigation of Botnet

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Next-Generation Firewalls: Critical to SMB Network Security

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Bonjour. Connect computers and electronic devices automatically, without any configuration. Features. Instant Networking and Dynamic Service Discovery

SECURING APACHE : DOS & DDOS ATTACKS - I

SSL BEST PRACTICES OVERVIEW

Transcription:

IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro

Background Liwei Ren Research interests Data security & privacy, network security analysis Data compression, math modeling & algorithms Measurable contributions: 10+ academic publications 20+ US patents granted 1 security software company in Silicon Valley with successful exit. Education MS/BS in mathematics, Tsinghua University, Beijing Ph.D in mathematics, MS in information science, University of Pittsburgh Trend Micro Global security software vendor with headquarter in Tokyo, and R&D centers in Silicon Valley, Nanjing and Taipei. A leader in cloud security. 2

Agenda Why do I have this sharing? IoT security: trends, problems and challenges A few security technologies & IoT Standard security protocols Summary 3

Why do I have this sharing? I am not an expert in IoT security yet What? Why do you share? A new computing platform leads to new security problems & challenges and new opportunities as well! I started to investigate IoT security after RSA conference in April: Too many questions (???) I like to invite experts to discuss via this sharing

Why do I have this sharing? IoT security means new opportunities for a security professional (like myself) to develop novel security solutions! 5

IoT security: trends, problems and challenges Trends (Stan Schneider Electronic Design) 6

IoT security: trends, problems and challenges Categories & Numbers: Source: Gartner Nov,2014) Internet of Things Units Installed Base by Category in Million Category 2013 2014 2015 2020 Automotive 96.0 189.6 372.3 3,511.1 Consumer 1,842.1 2,244.5 2.874.9 13,172.5 Generic Business 395.2 479.4 623.9 5,158.6 Vertical Business 698.7 836.5 1,009.4 3,164.4 Grand Total 3,032.0 3,750.0 4,880.6 25,006.6 7

IoT security: trends, problems and challenges Categories & Numbers : 8

IoT security: trends, problems and challenges What s new? 9

IoT security: trends, problems and challenges Security cases Attack Name Car recall Lizard Stressor Story Resource Date Chrysler recalled 1.4 million hackable cars in July, 2015 An attack online service hosted in Bosnia. It can convert homes and commercial routers into a zombie horde. CNN News July 24, 2015 An online article Jan 2015 First wide-scale hack involving television sets and at least one refrigerator. 750,000 spams were sent. Proofpoint Jan,2014 Linux.Darll oz Hacked Camera Discovered a worm for devices running Linux. A hacker was able to shout abuse at a two-yearold child by exploiting a vulnerability in a camera advertised as an ideal "baby monitor". Symantec Nov, 2013 ABC News Aug, 2013 10

IoT security: trends, problems and challenges Problems and security challenges Many small devices have limited CPU power Not much processing power for security Need to look for new encryption scheme with less CPU power. Can not install AV software Example: IP-addressable light bulbs. IoT also needs both encryption key management and identity management It may scale into billions! 11

IoT security: trends, problems and challenges Problems and security challenges New devices for endpoint security New firmware, embedded OS, new software & etc. It is not possible to support AV on every device. New transport protocols for making network security difficult! Much more network traffic for security analysis Bad news for large enterprises as network security is already complex and cumbersome 12

IoT security: trends, problems and challenges Seven IoT security risks*: 1. Disruption and denial-of-service attacks 2. Understanding the complexity of vulnerabilities 3. IoT vulnerability management 4. Identifying, implementing security controls 5. Fulfilling the need for security analytics capabilities 6. Modular hardware and software components 7. Rapid demand in bandwidth requirement *Source: INFORMATION SECURITY INSIDER EDITION / SECURING THE INTERNET OF THINGS, AUGUST 2014 13

IoT security: trends, problems and challenges IoT Security Top 10 (OWASP 2014): I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I4 Lack of Transport Encryption I5 Privacy Concerns I9 Insecure Software/Firmware I3 Insecure Network Services I6 Insecure Cloud Interface I7 Insecure Mobile Interface I8 Insufficient Security Configurability I10 Poor Physical Security 14

IoT security: trends, problems and challenges IoT will merge the following domains: 15

IoT security: trends, problems and challenges In the era of IoT, Do we need new concepts to describe IoT security? Do we need new security models for IoT? What is the gap between IoT security and existing security solutions? When cloud arrived, what did we do for new solutions? When smart phones and BYOD come, what did we do? What makes IoT different from the last two major waves? 16

A few security technologies & IoT Simple taxonomy of IoT security 17

A few security technologies & IoT My interests for evaluating a few solutions: Endpoint security Vulnerability and patch management Network security Network monitoring & visibility NetFlow based security analysis 18

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA = Firmware Over The Air FOTA is a technology developed for updating the firmware of mobile phones due to software bug fixes. It uses delta encoding (aka, differential compression) technique to reduce the patch size. Delta encoding can be shown as follows conceptually: 19

A few security technologies & IoT Vulnerability and patch management with FOTA Delta encoding was used for software vulnerability management. A significant example is Google Chrome software updating powered by an very efficient delta coding algorithm Courgette We use the same concept for IoT device security. 20

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA for bug fix of mobile phones in old days, and vulnerability management as well today. FOTA is also under development for car ECU patch management in the field of telematics, for the security purpose. 21

A few security technologies & IoT Vulnerability and patch management with FOTA FOTA for IoT security for general devices: 22

A few security technologies & IoT Network Security: Network monitoring & visibility NetFlow based security analysis 23

A few security technologies & IoT Network Security: monitoring & visibility with simple information: How many devices are there in this enterprise network? What kind of devices are they? Which devices transfer data which is not encrypted. Which has heavy volume of traffic? Which devices are most active? 24

A few security technologies & IoT Network Security: NetFlow based security analysis NetFlow is a router feature that collects IP network traffic as it enters or exits an interface. Version 5 collects the following values: Timestamps for the flow start and finish time, in milliseconds since the last boot. Number of bytes and packets observed in the flow source & destination IP addresses Source and destination port numbers for TCP, UDP, SCTP ICMP Type and Code. IP protocol Type of Service (ToS) value 25

A few security technologies & IoT Network Security: NetFlow based security analysis 26

Standard security protocols Why do we need a security information protocol such as OpenIOC? Describing security information Retrieving actionable security information Exchange security information between organizations Technical support for an intelligence security model How many security information protocol? OpenIOC CybOX IODEF 27

Standard security protocols What is security information? A piece of information that can be used to search for or identify potentially compromised systems. Example: IP Address / Domain Name URL File Hash Email Address X-Mailer HTTP User Agent File Mutex. 28

Standard security protocols Why do I discuss these security information protocols? There are still many security vendors not using protocols for exchanging information. A best practice is encouraged! Currently, these three protocols are not unified yet. This is not good! My personal opinion: They will become even more important in the era of IoT security. 29

Summary IoT: trends & security challenges A few security technologies for IoT Why standard security protocols are important. 30

Additional Information IoT Security Startups ZingBox VisualThreat : car cyber security Bastille Networks Mocana Interesting news: September 2015: McAfee created a new Automotive Security Review Board (ASRB). August 2015: Symantec announced that it is securing 1 billions IoT devices. July 2015: Symantec and Frost Data Capital work together to fund early-stage startups in big data and IoT security May 2015: Google is offering a lightweight OS for IoT devices. 31

Q & A Thank you for your attention! Do you have questions? Email: liwei_ren@trendmicro.com Home page: https://pitt.academia.edu/liweiren 32