RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT

Alberto Huertas Celdrán,Pedro Miguel Sánchez Sánchez,Jan von der Assen,Timo Schenk,Gérôme Bovet,Gregorio Martínez Pérez,Burkhard Stiller
DOI: https://doi.org/10.1109/tifs.2024.3402055
IF: 7.231
2024-05-25
IEEE Transactions on Information Forensics and Security
Abstract:Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for RL, and iii) calculating the consumption of resources in single-board computers (SBC). Thus, the work at hand proposes an online RL-based framework that learns correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. The Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming < 1 MB of storage, % of RAM, and negligible CPU.
computer science, theory & methods,engineering, electrical & electronic
What problem does this paper attempt to address?