With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy--a recently proposed solution to enhance the security of resource-constrained IoT devices--allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic--a prevailing characteristic of contemporary network communication.
Detecting Cryptomining Traffic in IoT Networks / Mannella, Luca; Canavese, Daniele; Regano, Leonardo. - ELETTRONICO. - (2024). (Intervento presentato al convegno 9th International Conference on Smart and Sustainable Technologies (SpliTech 2024) tenutosi a Split/Bol (HR) nel June 25-28, 2024) [10.23919/SpliTech61897.2024.10612663].
Detecting Cryptomining Traffic in IoT Networks
Luca Mannella;Daniele Canavese;Leonardo Regano
2024
Abstract
With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy--a recently proposed solution to enhance the security of resource-constrained IoT devices--allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic--a prevailing characteristic of contemporary network communication.File | Dimensione | Formato | |
---|---|---|---|
2024-SpliTech_IoTProxy-Cryptojacking_camera-ready_v1.1.pdf
accesso aperto
Descrizione: Camera-ready Version
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
158.69 kB
Formato
Adobe PDF
|
158.69 kB | Adobe PDF | Visualizza/Apri |
Detecting_Cryptomining_Traffic_in_IoT_Networks.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
171.63 kB
Formato
Adobe PDF
|
171.63 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2988213