Design, Analysis, and Evaluation
Total Page:16
File Type:pdf, Size:1020Kb
An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation Item Type text; Electronic Dissertation Authors Pacheco Ramirez, Jesus Horacio Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 02/10/2021 07:40:12 Link to Item http://hdl.handle.net/10150/625581 1 AN ANOMALY BEHAVIOR ANALYSIS METHODOLOGY FOR THE INTERNET OF THINGS: DESIGN, ANALYSIS, AND EVALUATION By Jesus Horacio Pacheco Ramirez Copyright Jesus Horacio Pacheco Ramirez 2017 A Dissertation Submitted to the Faculty of the DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2017 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Jesus Horacio Pacheco Ramirez entitled “An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation” and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________Date: June 08, 2017 Dr. Salim Hariri _______________________________________________________Date: June 08, 2017 Dr. Ali Akoglu _______________________________________________________Date: June 08, 2017 Dr. Gregory Ditzler Final approval and acceptance of this dissertation is contingent upon the candidate's submission of the final copies of the dissertation to the Graduate College. I hereby certify that I have read this dissertation prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. _________________________________________________________Date: 06/08/2017 Dissertation Director: Dr. Salim Hariri 3 STATEMENT BY AUTHOR This dissertation has been submitted in partial fulfillment of the requirements for an advanced degree at the University of Arizona and is deposited in the University Library to be made available to borrowers under rules of the Library. Brief quotations from this dissertation are allowable without special permission, provided that an accurate acknowledgement of the source is made. Requests for permission for extended quotation from or reproduction of this manuscript in whole or in part may be granted by the head of the major department or the Dean of the Graduate College when in his or her judgment the proposed use of the material is in the interests of scholarship. In all other instances, however, permission must be obtained from the author. SIGNED: Jesus Horacio Pacheco Ramirez 4 ACKNOWLEDGEMENTS Foremost, I would like to express my sincere appreciation to my advisor, Prof. Salim Hariri, whose invaluable advice and support have made this work possible. I am most grateful for his encouragement, broad knowledge and deep insights which have made the research experience fascinating and exciting throughout my whole graduate study. I would like to express my love and appreciation for my parents, family and friends, for encouraging me in my academic pursuits and their support over these years. Without them I would have never gotten here. I sincerely thank my doctoral committee members, Dr. Ali Akoglu, Dr. Gregory Ditzler, and Dr. Ricardo Valerdi for serving on my dissertation and comprehensive exams committees, providing helpful advices and suggestions. I would like to really appreciate my great colleagues from ACL lab Cihan Tunc, Pratik Satam, Zhiwen Pan, and Shalaka Satam, and all faculty and staff in the department of Electrical and Computer Engineering which made a great atmosphere for me to enjoy my research, especially Nancy Emptage, Anna Seiple and Tami Whelan. Finally I want to express my gratitude to my sponsors CONACYT, Universidad de Sonora, and PRODEP for their economical support and administrative advices during my studies. 5 TABLE OF CONTENTS List of Figures ..................................................................................................................... 8 List of Tables ...................................................................................................................... 9 Abstract ............................................................................................................................. 10 1 Introduction ................................................................................................................. 12 1.1 Motivation .............................................................................................. 12 1.2 Problem Statement ................................................................................. 15 1.3 Research Objective ................................................................................ 17 1.4 Dissertation Organization ...................................................................... 19 2 Background and Related Work ................................................................................... 21 2.1 Smart Infrastructures (SI) ...................................................................... 21 2.2 IoT Cybersecurity .................................................................................. 25 2.3 Threat Modeling..................................................................................... 27 2.4 Anomaly Behavior Analysis .................................................................. 27 2.5 Overview of Cybersecurity for IoT End-Nodes (1 st Case Study) .......... 31 2.6 Overview of Cybersecurity for IoT Communications (2nd Case Study) .... .................................................................................................... 34 3 IoT Hierarchical Architecture for Smart Infrastructures ............................................ 37 3.1 IoT Multilayer Architecture ................................................................... 37 3.1.1 End Nodes Layer........................................................................... 38 3.1.2 Communications Layer ................................................................. 40 3.1.3 Services Layer ............................................................................... 42 3.1.4 Application Layer ......................................................................... 44 3.2 Smart Building Testbed ......................................................................... 46 3.3 Smart Home Testbed.............................................................................. 48 3.4 Smart Water System Testbed ................................................................. 51 3.5 Smart Vehicle Testbed ........................................................................... 52 4 IoT Multilayer Security Framework ........................................................................... 54 6 4.1 Threat Modeling Framework ..................................................................... 55 4.1.1 End Nodes Layer........................................................................... 56 4.1.2 Communications Layer ................................................................. 56 4.1.3 Services Layer ............................................................................... 57 4.1.4 Applications Layer ........................................................................ 58 4.2 IoT Multilayer Attack Surface ............................................................... 59 5 Anomaly Behavior Analysis for IoT Sensors ............................................................. 61 5.1 Abnormal behavior analysis methodology for IoT sensors ................... 61 5.1.1 Continuous monitoring ................................................................. 61 5.1.2 Sensor Behavior Data Structure (SBDS) ...................................... 62 5.1.3 Abnormal Behavior Analysis ........................................................ 66 5.1.4 Classification................................................................................. 68 5.1.5 Recovery actions ........................................................................... 68 5.2 Experiments and Results ........................................................................ 68 5.2.1 Experimental Setup ....................................................................... 68 5.2.2 Offline Training Phase .................................................................. 69 5.2.3 Online Testing Phase .................................................................... 73 5.2.4 Sample Size ................................................................................... 76 5.2.5 Recovery Actions .......................................................................... 81 5.3 Conclusions and future work ................................................................. 82 6 Anomaly Behavior Analysis for IoT Secure Gateway ............................................... 84 6.1 Abnormalities in Water Consumption ................................................... 84 6.2 Anomaly Behavior Analysis Methodology for Secure Gateway ........... 86 6.2.1 Training phase (offline) ................................................................ 87 6.2.2 Runtime unit (online) ...................................................................