File(s) not publicly available
Integrity of IoT network flow records in encrypted traffic analytics
chapter
posted on 2023-03-16, 22:24 authored by AK Cherukuri, IS Thaseen, Gang LiGang Li, Xiao LiuXiao Liu, V Das, A RajIdentifying threats in encrypted network traffic without compromising the integrity of the data is an important issue. Many IoT devices communicate with the cloud to store and process information. Telemetry of this network flow is used to analyze the traffic. This chapter discusses different flow-based approaches for traffic classification and how to ensure integrity of flow records between senders to collector in IoT network. It presents the background of the encrypted traffic analytics. The chapter then outlines flow-based telemetry and threats to telemetry data. An authentication technique using hashing for flow-based data is discussed. A case study is demonstrated with three different cases to simulate the various cases proposed for authenticating the flow-based data using benchmark IoT flow-based dataset. The three different cases include hashed flow record; symmetric with hash flow record and asymmetric with hash flow record.