Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices

Industrial IoT devices are vulnerable to code-reuse attacks in which benign codes of these devices are reused for malicious activities. In the sense that adversary can compromise industrial IoT devices by means of code-reuse attacks and impair entire industrial IoT ecosystems through the compromised...

Full description

Bibliographic Details
Main Author: Jun-Won Ho
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8471162/
_version_ 1818618013883039744
author Jun-Won Ho
author_facet Jun-Won Ho
author_sort Jun-Won Ho
collection DOAJ
description Industrial IoT devices are vulnerable to code-reuse attacks in which benign codes of these devices are reused for malicious activities. In the sense that adversary can compromise industrial IoT devices by means of code-reuse attacks and impair entire industrial IoT ecosystems through the compromised industrial IoT devices, it is very imperative to detect code-reuse attacks in industrial IoT devices. Although different types of code-reuse attack detection schemes have been devised in the literature, they are mainly system level or inefficient/vulnerable network level defense techniques. For the efficient and robust network level defense, we propose a scheme that detects code-reuse attacks efficiently and resiliently by incorporating the sequential probability ratio test (SPRT) with the probabilistic inspection on the packets incoming into industrial IoT devices. Through experimental and analytical study, we demonstrate that our proposed detection scheme resiliently and efficiently defends against code-reuse attacks in industrial IoT devices. In particular, our simulation results show that the SPRT with probabilistic packet inspection achieves at least 93.2% and 99.0% average detection rate for small and large set of code-reuse packets, respectively, while demanding below five samples for detection on an average. They also exhibit that it achieves at most 0.4% average false positives with below four samples on an average.
first_indexed 2024-12-16T17:14:51Z
format Article
id doaj.art-410611f965d64e88bd626121dbce22f8
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T17:14:51Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-410611f965d64e88bd626121dbce22f82022-12-21T22:23:19ZengIEEEIEEE Access2169-35362018-01-016543435435410.1109/ACCESS.2018.28720448471162Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT DevicesJun-Won Ho0https://orcid.org/0000-0003-2070-9861Department of Information Security, Seoul Women’s University, Seoul, South KoreaIndustrial IoT devices are vulnerable to code-reuse attacks in which benign codes of these devices are reused for malicious activities. In the sense that adversary can compromise industrial IoT devices by means of code-reuse attacks and impair entire industrial IoT ecosystems through the compromised industrial IoT devices, it is very imperative to detect code-reuse attacks in industrial IoT devices. Although different types of code-reuse attack detection schemes have been devised in the literature, they are mainly system level or inefficient/vulnerable network level defense techniques. For the efficient and robust network level defense, we propose a scheme that detects code-reuse attacks efficiently and resiliently by incorporating the sequential probability ratio test (SPRT) with the probabilistic inspection on the packets incoming into industrial IoT devices. Through experimental and analytical study, we demonstrate that our proposed detection scheme resiliently and efficiently defends against code-reuse attacks in industrial IoT devices. In particular, our simulation results show that the SPRT with probabilistic packet inspection achieves at least 93.2% and 99.0% average detection rate for small and large set of code-reuse packets, respectively, while demanding below five samples for detection on an average. They also exhibit that it achieves at most 0.4% average false positives with below four samples on an average.https://ieeexplore.ieee.org/document/8471162/Code-reuse attacksprobabilistic packet inspectionsequential probability ratio test (SPRT)
spellingShingle Jun-Won Ho
Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
IEEE Access
Code-reuse attacks
probabilistic packet inspection
sequential probability ratio test (SPRT)
title Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
title_full Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
title_fullStr Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
title_full_unstemmed Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
title_short Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices
title_sort efficient and robust detection of code reuse attacks through probabilistic packet inspection in industrial iot devices
topic Code-reuse attacks
probabilistic packet inspection
sequential probability ratio test (SPRT)
url https://ieeexplore.ieee.org/document/8471162/
work_keys_str_mv AT junwonho efficientandrobustdetectionofcodereuseattacksthroughprobabilisticpacketinspectioninindustrialiotdevices