Optimal deployments of defense mechanisms for the internet of things
Version 2 2024-06-18, 18:36Version 2 2024-06-18, 18:36
Version 1 2019-12-16, 13:31Version 1 2019-12-16, 13:31
conference contribution
posted on 2024-06-18, 18:36authored byM Ge, JH Cho, CA Kamhoua, DS Kim
Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. Little work has taken hybrid approaches that combine different defense mechanisms in an optimal way to increase the security of the IoT against sophisticated attacks. In this work, we propose a novel approach to generate the strategic deployment of adaptive deception technology and the patch management solution for the IoT under a budget constraint. We use a graphical security model along with three evaluation metrics to measure the effectiveness and efficiency of the proposed defense mechanisms. We apply the multi-objective genetic algorithm (GA) to compute the {\em Pareto optimal} deployments of defense mechanisms to maximize the security and minimize the deployment cost. We present a case study to show the feasibility of the proposed approach and to provide the defenders with various ways to choose optimal deployments of defense mechanisms for the IoT. We compare the GA with the exhaustive search algorithm (ESA) in terms of the runtime complexity and performance accuracy in optimality. Our results show that the GA is much more efficient in computing a good spread of the deployments than the ESA, in proportion to the increase of the IoT devices.
History
Pagination
8-17
Location
Barcelona, Spain
Start date
2018-09-06
End date
2018-09-06
ISBN-13
9781728115689
Language
eng
Publication classification
E1 Full written paper - refereed
Editor/Contributor(s)
[Unknown]
Title of proceedings
SIoT 2018 : Proceedings of the 2018 International Workshop on Secure Internet of Things
Event
Secure Internet of Things. International Workshop (2018 : Barcelona, Spain)