Author/Authors :
Cruz,Bruno Department of Computer Science - University of Vigo, ESEI—Escuela Superior de Ingenier´ıa Informa´tica - Edificio Polit´ecnico - Campus Universitario As Lagoas s/n - Spain , ´mez-Meire, Silvana Go Department of Computer Science - University of Vigo, ESEI—Escuela Superior de Ingenier´ıa Informa´tica - Edificio Polit´ecnico - Campus Universitario As Lagoas s/n - Spain , Janicke, Helge Cyber Technology Institute - School of Computer Science and Informatics- De Montfort University, UK , Yevseyeva ,Iryna Cyber Technology Institute - School of Computer Science and Informatics- De Montfort University, UK , Ruano-Orda´s, David Department of Computer Science - University of Vigo, ESEI—Escuela Superior de Ingenier´ıa Informa´tica - Edificio Polit´ecnico - Campus Universitario As Lagoas s/n - Spain , Me´ndez, Jose R. Department of Computer Science - University of Vigo, ESEI—Escuela Superior de Ingenier´ıa Informa´tica - Edificio Polit´ecnico - Campus Universitario As Lagoas s/n - Spain
Abstract :
The Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices. This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support. Many manufacturers quickly created hundreds of devices implementing functionalities but neglected some critical issues pertaining to device security. This oversight gave rise to the current situation where thousands of devices remain unpatched having many security issues that manufacturers cannot address after the devices have been produced and deployed. This article presents our novel research protecting IOT devices using Berkeley Packet Filters (BPFs) and evaluates our findings with the aid of our Filter.tlk tool, which is able to facilitate the development of BPF expressions that can be executed by GNU/Linux systems with a low impact on network packet throughput.
Keywords :
Security Incident Datasets , Practical Approach , Protect IoT , Devices , Security Incident , Compile Datasets