Towards Continuous Threat Defense: In-Network Traffic Analysis for IoT Gateways

Mingyuan Zang, Changgang Zheng, Lars Dittmann, Noa Zilberman

Research output: Contribution to journalJournal articleResearchpeer-review

20 Downloads (Pure)

Abstract

The widespread use of IoT devices has unveiled overlooked security risks. With the advent of ultra-reliable lowlatency communications (URLLC) in 5G, fast threat defense is critical to minimize damage from attacks. IoT gateways, equipped with wireless/wired interfaces, serve as vital frontline defense against emerging threats on IoT edge. However, current gateways struggle with dynamic IoT traffic and have limited defense capabilities against attacks with changing patterns. In-network computing offers fast machine learning-based attack detection and mitigation within network devices, but leveraging its capability in IoT gateways requires new continuous learning capability and runtime model updates. In this work, we present P4Pir, a novel in-network traffic analysis framework for IoT gateways. P4Pir incorporates programmable data plane into IoT gateway, pioneering the utilization of in-network machine learning (ML) inference for fast mitigation. It facilitates continuous and seamless updates of in-network inference models within gateways. P4Pir is prototyped in P4 language on Raspberry Pi and Dell Edge Gateway. With ML inference offloaded to gateway’s data plane, P4Pir’s in-network approach achieves swift attack mitigation and lightweight deployment compared to prior ML-based solutions. Evaluation results using three public datasets show that P4Pir accurately detects and fastly mitigates emerging attacks (>30% accuracy improvement and sub-millisecond mitigation time). The proposed model updates method allows seamless runtime updates without disrupting network traffic.
Original languageEnglish
Article number10285332
JournalIEEE Internet of Things Journal
Volume11
Issue number6
Pages (from-to)9244 - 9257
ISSN2372-2541
DOIs
Publication statusPublished - 2024

Fingerprint

Dive into the research topics of 'Towards Continuous Threat Defense: In-Network Traffic Analysis for IoT Gateways'. Together they form a unique fingerprint.

Cite this