With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy-a recently proposed solution to enhance the security of resource-constrained IoT devices-allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic-a prevailing characteristic of contemporary network communication.

Detecting Cryptomining Traffic in IoT Networks

Regano L.
Co-primo
2024-01-01

Abstract

With the proliferation of Internet of Things (IoT) devices in smart home environments, the threat landscape has expanded to include cryptojacking attacks, which exploit computational resources for unauthorized cryptocurrency mining. In response to these challenges, this paper extends the security capability of the IoT Proxy-a recently proposed solution to enhance the security of resource-constrained IoT devices-allowing users to take advantage of its security functionalities also in smart home environments. By integrating a new machine learning-based cryptojacking detection module, this enhanced version of the IoT Proxy can identify these emerging threats, safeguarding both the integrity and performance of all the devices in the smart home network. The IoT Proxy serves a dual purpose by providing security functionalities for resource-constrained IoT devices and offering additional layers of defense for less constrained devices, thereby ensuring comprehensive protection across the smart home ecosystem. The conducted experiments demonstrate the efficacy of the approach without relying on Deep Packet Inspection (DPI), thus preserving user privacy and making it applicable even to encrypted traffic-a prevailing characteristic of contemporary network communication.
2024
Cryptomining
Gateways
Internet of Things (IoT)
Intrusion Prevention Systems (IPS)
Machine Learning (ML)
Network Security
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11584/414704
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact