Deakin University
Browse

File(s) under permanent embargo

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks

Version 2 2024-06-06, 03:15
Version 1 2023-01-30, 23:31
conference contribution
posted on 2023-01-30, 23:31 authored by Guizhen Yang, M Ge, Shang GaoShang Gao, Xuequan Lu, Leo ZhangLeo Zhang, Robin Ram Mohan DossRobin Ram Mohan Doss
Protecting Internet of Things (IoT) network from private data breach is a grand challenge. Data breach may occur when networks’ statistical information is disclosed due to network scanning or data stored on the IoT devices is accessed by attackers because of lack of protection on IoT devices. To protect IoT networks, effective proactive cyber defence technologies (e.g., Moving Target Defence (MTD) and deception) have been proposed. They defend against attacks by dynamically changing attack surface or hiding true network information. However, little work considered the protection of statistical information of IoT network, such as the number of VLANs or the number of devices across VLANs. This type of information may leak the network’s operational information to attackers (e.g., functional information of VLANs). To address this problem, we propose a differential privacy (DP)-based defence method to mitigate its leakage. In this paper, we strategically obfuscate VLANs’ statistical information by integrating DP with MTD and deception technologies. Software-defined networking technology is leveraged to manage data flows among devices and support shuffling-based MTD. Two strategies (random and intelligent) are considered for defence deployment. A greedy algorithm is designed to explore the trade-off between defence cost and privacy protection level. We theoretically prove that the proposed method meets the definition of DP, thus offering solid privacy protection to the operational information of an IoT network. Extensive experimental results further demonstrate that, for a given defence budget, there exists a trade-off between protection level and cost. Moreover, the intelligent deployment strategy is more cost-effective than the random one under the same settings.

History

Volume

13787 LNCS

Pagination

406-425

ISSN

0302-9743

eISSN

1611-3349

ISBN-13

9783031230196

Publication classification

E1 Full written paper - refereed

Title of proceedings

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Publisher

Springer Nature Switzerland

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC