With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy--a recently proposed solution to enhance the security of resource-constrained IoT devices--allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic--a prevailing characteristic of contemporary network communication.

Detecting Cryptomining Traffic in IoT Networks / Mannella, Luca; Canavese, Daniele; Regano, Leonardo. - ELETTRONICO. - (In corso di stampa). (Intervento presentato al convegno 9th International Conference on Smart and Sustainable Technologies (SpliTech 2024) tenutosi a Split/Bol (HR) nel June 25-28, 2024).

Detecting Cryptomining Traffic in IoT Networks

Luca Mannella;Daniele Canavese;Leonardo Regano
In corso di stampa

Abstract

With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy--a recently proposed solution to enhance the security of resource-constrained IoT devices--allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic--a prevailing characteristic of contemporary network communication.
In corso di stampa
File in questo prodotto:
File Dimensione Formato  
2024-SpliTech_IoTProxy-Cryptojacking_camera-ready_v1.1.pdf

accesso aperto

Descrizione: Camera-ready Version
Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 158.69 kB
Formato Adobe PDF
158.69 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2988213