Home > Research > Publications & Outputs > MUD-Based Behavioral Profiling Security Framewo...

Links

Text available via DOI:

View graph of relations

MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks. / Krishnan, Prabhakar; Jain, Kurunandan; Buyya, Rajkumar et al.
In: IEEE Internet of Things Journal, Vol. 9, No. 9, 01.05.2022, p. 6611-6622.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Krishnan, P, Jain, K, Buyya, R, Vijayakumar, P, Nayyar, A, Bilal, M & Song, H 2022, 'MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks', IEEE Internet of Things Journal, vol. 9, no. 9, pp. 6611-6622. https://doi.org/10.1109/JIOT.2021.3113577

APA

Krishnan, P., Jain, K., Buyya, R., Vijayakumar, P., Nayyar, A., Bilal, M., & Song, H. (2022). MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks. IEEE Internet of Things Journal, 9(9), 6611-6622. https://doi.org/10.1109/JIOT.2021.3113577

Vancouver

Krishnan P, Jain K, Buyya R, Vijayakumar P, Nayyar A, Bilal M et al. MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks. IEEE Internet of Things Journal. 2022 May 1;9(9):6611-6622. doi: 10.1109/JIOT.2021.3113577

Author

Krishnan, Prabhakar ; Jain, Kurunandan ; Buyya, Rajkumar et al. / MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks. In: IEEE Internet of Things Journal. 2022 ; Vol. 9, No. 9. pp. 6611-6622.

Bibtex

@article{b0e779a026d34ef3892ac53428ebbc26,
title = "MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks",
abstract = "The rapid development and deployment of Internet of Things (IoT) devices in modern networks and Industry 4.0 have attracted substantial interest from cybersecurity researchers. In this study, we propose a software-defined framework that improves network intrusion detection systems by using manufacturer usage description (MUD) to enhance the behavioral monitoring in IoT networks. We aim to explore whether Industrial IoT (IIoT) devices typically serve a common role in cyber-physical systems, and their communications exhibit predictable patterns that can be defined in MUD profile(s) formally and succinctly. We design a framework that utilizes the concept of digital twins and software-defined networking to improve the security of IIoT environments. The MUD data are profiled, and the actions are evaluated on the network digital twin before they are used in the physical network. The behavioral profiling system is updated in real time, thereby improving the overall system security and compliance to policies in the IoT deployment. Evaluation results show that our solution outperforms existing approaches substantially in terms of attack detection accuracy, predicting security incidents, response time, and resource usage.",
keywords = "Digital twin, Manufacturer usage description (MUD), Network security, Software-defined networking (SDN)",
author = "Prabhakar Krishnan and Kurunandan Jain and Rajkumar Buyya and Pandi Vijayakumar and Anand Nayyar and Muhammad Bilal and Houbing Song",
year = "2022",
month = may,
day = "1",
doi = "10.1109/JIOT.2021.3113577",
language = "English",
volume = "9",
pages = "6611--6622",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",
number = "9",

}

RIS

TY - JOUR

T1 - MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks

AU - Krishnan, Prabhakar

AU - Jain, Kurunandan

AU - Buyya, Rajkumar

AU - Vijayakumar, Pandi

AU - Nayyar, Anand

AU - Bilal, Muhammad

AU - Song, Houbing

PY - 2022/5/1

Y1 - 2022/5/1

N2 - The rapid development and deployment of Internet of Things (IoT) devices in modern networks and Industry 4.0 have attracted substantial interest from cybersecurity researchers. In this study, we propose a software-defined framework that improves network intrusion detection systems by using manufacturer usage description (MUD) to enhance the behavioral monitoring in IoT networks. We aim to explore whether Industrial IoT (IIoT) devices typically serve a common role in cyber-physical systems, and their communications exhibit predictable patterns that can be defined in MUD profile(s) formally and succinctly. We design a framework that utilizes the concept of digital twins and software-defined networking to improve the security of IIoT environments. The MUD data are profiled, and the actions are evaluated on the network digital twin before they are used in the physical network. The behavioral profiling system is updated in real time, thereby improving the overall system security and compliance to policies in the IoT deployment. Evaluation results show that our solution outperforms existing approaches substantially in terms of attack detection accuracy, predicting security incidents, response time, and resource usage.

AB - The rapid development and deployment of Internet of Things (IoT) devices in modern networks and Industry 4.0 have attracted substantial interest from cybersecurity researchers. In this study, we propose a software-defined framework that improves network intrusion detection systems by using manufacturer usage description (MUD) to enhance the behavioral monitoring in IoT networks. We aim to explore whether Industrial IoT (IIoT) devices typically serve a common role in cyber-physical systems, and their communications exhibit predictable patterns that can be defined in MUD profile(s) formally and succinctly. We design a framework that utilizes the concept of digital twins and software-defined networking to improve the security of IIoT environments. The MUD data are profiled, and the actions are evaluated on the network digital twin before they are used in the physical network. The behavioral profiling system is updated in real time, thereby improving the overall system security and compliance to policies in the IoT deployment. Evaluation results show that our solution outperforms existing approaches substantially in terms of attack detection accuracy, predicting security incidents, response time, and resource usage.

KW - Digital twin

KW - Manufacturer usage description (MUD)

KW - Network security

KW - Software-defined networking (SDN)

U2 - 10.1109/JIOT.2021.3113577

DO - 10.1109/JIOT.2021.3113577

M3 - Journal article

AN - SCOPUS:85115146064

VL - 9

SP - 6611

EP - 6622

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 9

ER -