论文标题
RL和指纹构图以选择IoT中零日攻击的移动目标防御机制
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
论文作者
论文摘要
网络犯罪分子正朝着影响资源受限设备(例如单板计算机(SBC))的零日攻击迈进。假设完美的安全性是不现实的,那么移动目标防御(MTD)是通过动态改变目标攻击表面来减轻攻击的有前途的方法。尽管如此,为零日攻击选择合适的MTD技术还是一个开放的挑战。加固学习(RL)可能是通过反复试验优化MTD选择的有效方法,但是当i)评估在现实情况下评估RL和MTD解决方案的性能时,文献失败了。为了提高这些局限性,手头的工作提出了一个基于在线RL的框架,以学习适当的MTD机制,以减轻SBC中异质零攻击的异质性零攻击。该框架认为行为指纹识别代表SBCS状态和RL以学习减轻每个恶意状态的MTD技术。它已被部署在一个真正的物联网人群场景中,并用覆盆子Pi充当频谱传感器。更详细地说,Raspberry Pi已被不同的命令和控制恶意软件,Rootkits和Ransomware的样本感染,以便在四种现有MTD技术之间进行选择。一组实验证明了该框架的适用性,以学习适当的MTD技术,以减轻所有攻击(有害rootkit除外),同时消耗<1 MB的存储空间,并利用<55%的CPU和<80%的RAM。
Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for representing SBC's states, and iii) calculating the consumption of resources in SBC. To improve these limitations, the work at hand proposes an online RL-based framework to learn the correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. More in detail, the Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming <1 MB of storage and utilizing <55% CPU and <80% RAM.