How to Improve the Iot Security Implementing IDS/IPS Tool Using Raspberry Pi 3B+
Total Page:16
File Type:pdf, Size:1020Kb
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 9, 2019 How to Improve the IoT Security Implementing IDS/IPS Tool using Raspberry Pi 3B+ 1 Ruíz-Lagunas Juan Jesús Reyes-Gutiérrez Mauricio René3 Departamento de Sistemas y Computación, TecNM/I.T. Facultad de Ingeniería Eléctrica-UMSNH/Departamento de Morelia and Universidad Vasco de Quiroga Sistemas y Computación TecNM/I.T. Morelia Morelia, México Morelia, México 2 Antolino-Hernández Anastacio , Torres-Millarez Ferreira-Medina Heberto4 5 6 Cristhian , Paniagua-Villagómez Omar Unidad de TICs, IIES-UNAM and Departamento de Sistemas Departamento de Sistemas y Computación y Computación, TecNM/I.T. Morelia TecNM/I.T. Morelia, Morelia, México Morelia, México Abstract—This work shows a methodology of implementation The concept of “smart” devices is inherent in connectivity and testing of the system is proposed and tested with a prototype; to obtain benefits from the information [2]. Industry it is constructed with sensors and actuators that allow monitoring automation, and monitoring systems are the main reasons for the behavior of the system in an environment under threats. We this technology’s success, so data networks are being unified used an IDS / IPS as a protection tool for IoT systems, based on with production networks to achieve these benefits. It has been Raspberry Pi and Raspbian operating system. It is described in a estimated that in 2018 there were more than 7 billion IoT block diagram the testing method used. We implemented the devices [3]. It is estimated that by 2020 there will be more than IDS/IPS Snort tool in an embedded platform Raspberry. It 10 billion and more than 22 billion by 2025. This worldwide presents also the state of the art of cloud frameworks that have trend is due to the growing demand to connect devices to the the same objective of protecting. The main contribution is the networks. implemented testing method for Snort that can be used with security rules in other applications of embedded IoT devices. With this trend, has been observed clearly that the way of the information interchange with technology will change, but at Keywords—Security IoT; IDS/IPS software; Pentesting tools; what cost? Due to the demand for interconnection, many IoT smart cities; prototype Raspberry developers do not consider the security in communication for many reasons: Amongst these, we have processing costs, I. INTRODUCTION training and algorithm implementation. Today, Information Technology (IT) is immersed in the use and exploitation of telecommunications networks, to which IoT devices are considered to have many weaknesses in more devices are connecting every day to communicate with information security since their development. The following each other (Peer to Peer) and to a central device (client-server). are examples described below: Internet of Things (IoT) offers wide range state of the art Passwords stored in plain text. solutions, using sensors and/or devices, which monitor to control certain events, giving rise to new challenges to IT Outdated firmware and not encryption. security, since information gathered can be compromised by this variety of components. Internet of Things (IoT) is a Video streaming without encryption. concept defined by Kevin Ashton in 1999, which describes a Communication between devices and servers in plain network that connects people and objects [1]. These objects, text. right now, allow computers to have “sensors”, which facilitate them, not only to process information but gather more Over-shared data (influence of cloud utilization). information through these devices, allowing applications to be Development bugs in the firmware. even more “intelligent”, since it is possible to make decisions in real-time, based on a major quantity of information. It is Use of default passwords. possible to assure that since the first implementation of IoT up until date there are millions of sensors interconnected. Devices have a direct interface to the internal network, but they can be connected to the Internet, making increase an attack risk exponentially. Sponsors TecNM/I.T. Morelia and IIES-UNAM, México 399 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 9, 2019 In addition, it has known that hackers are exploiting these Section III describes IDS/IPS tools, in Section IV describes the vulnerabilities with current tools and techniques of their own to methodology, Section V shows the results about this work, and achieve that goal. One of the most recent tools to detect finally, in Section VI shows conclusions. vulnerabilities in IoT devices is Autosploit [4], since it uses artificial intelligence in its algorithms [5]. II. SECURITY IN IOT The main contribution of this paper is to present a testing As a response to exposed security problems, the main method for IDS/IPS and the comparison of its response software developers propose various strategies to guarantee implemented on the Raspberry platform to Nmap and security in interconnection components. According to [6] the Metasploit of network attacks. The paper is organized as expansion of IoT, it has been developing in the following follows: Section II deals with actual security in IoT, in areas, see Table I. TABLE. I. IOT EXPANSION AREAS BASED ON [6] Description IoT development areas Elements Opportunities Challenges - Health care. - Consumer and Retail businesses. Technologies that promote Ensure secure information and data Smart life - Bank Convergence. simplifications in the lives of the exchange. - Security. users. - Public services - Intelligent vehicles - Urban mobility. - Intercity mobility. Real-time solutions that make Secure interconnection and secure real- Smart mobility - Rate management and payment mobility simpler and transport time monitoring and activation. solutions. reliable. - Distribution and logistics. -Fleet management. - Intelligent infrastructure management. - Cross-agency collaboration using the The innovations will aim to cloud. Ensure that users exchange improve the quality of life in the Smart Cities - Data collection in real time and quickly. information in real time and keep their city. Using sensors and systems - Better planning of cities. data protected against hackers. that help in decision-making. -Network utilities. -Construction Development. - Machine learning. -Communication between machines. Smart solutions to optimize Keep process information safe, - Network interconnection. Smart manufacturing production processes, controls and interconnections between machines -Optimization of processes. quality. using secure protocols. -Proactive asset management. - Improve infrastructure integration. features of these proposals that are a reference as a framework III. FRAMEWORKS FOR SECURITY IN IOT and cloud computing. A. Frameworks in the Cloud The list of platforms shown in Table III is compared by the According to [7] the challenge in IoT, security will be to type of framework and the security mechanisms they offer with build services that can be integrated into different software encryption method, in a mobile application (App) or any API. solutions. In platforms described in [8], [9], [10], [11], [12] and Despite the implementation of different security schemes [13] a set of services oriented to software and hardware both in the device, in the interconnection and in the cloud, solutions to offer layers of security at different levels, working these do not guarantee that the IoT components are free from from the platform (PaaS, Platform as a Service), and services attacks using the different layers of the communication (SaaS, Software as a Service), which are offered with auto- protocols [20]. service, cost and on-demand schemes. Table II shows the main 400 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 9, 2019 TABLE. II. MAIN FRAMEWORKS IN THE CLOUD THAT OFFER SECURITY FOR IOT Framework Description Elements Security Oriented to platforms with clients It offers a cloud platform, as well as IoT hardware, - Software for devices. and servers using secure Amazon Web Services IoT operating system, software and cloud connectivity - Service control. interconnection mechanisms, it [8] services, security layers, monitoring, and - Data services. offers cryptography and monitoring administration software for PaaS services. - Secure interconnection services. services. They offer a cloud platform with open and flexible - Device layer. It offers an exchange of information services to connect securely, monitor and manage -Interconnection layer. with the devices, using languages Microsoft Azure IoT Hub [9] IoT devices and develop applications using open - Cloud access layer. such as NodeJS, .Net, Java, Python, source SDK (Development Kit) and multiple - Hub layer. Android, IOS and C. It establishes protocols. Working under a SaaS scheme. - Back-End for Apps. layers of security for the connection. It offers a PaaS scheme, which allows you to It offers connectivity with IOS, - Software for devices. connect IoT devices to the cloud, analyze data in Android and any device that uses Oracle Internet of Things - Hub for access to cloud real time to integrate it into business applications, Java, Posix C, and the RESTful Cloud Services [10] services. allows you to establish web services and any other protocol offers a cryptography - Offers a wide range of SaaS. Oracle proprietary service.