
INXU - A Security Extension for RFC 8520 to Give Fast Response to New Vulnerabilities on Domestic IoT Networks
Author(s) -
Sávyo V. Morais,
Claudio M. de Farias
Publication year - 2020
Language(s) - English
Resource type - Conference proceedings
DOI - 10.5753/wpietf.2020.13792
Subject(s) - computer security , botnet , computer science , the internet , context (archaeology) , internet of things , blocking (statistics) , extension (predicate logic) , security association , computer network , cloud computing security , security information and event management , world wide web , cloud computing , paleontology , biology , programming language , operating system
As domestic Internet of Things (DIoT) devices become more popular, the number of devices connected to the Internet increases. It may also represent a risk to the end-user’s security and privacy. The infected devices can be used in DIoT botnets affecting the Internet’s stability. Although there are efforts to enhance IoT security, such as RFC 8520, there still needs for improvements in the DIoT context. To ensure DIoT security, this paper proposes INXU, an extension of RFC 8520 that enables blocking traffic related to well-known malicious activities. INXU introduces the concept of Malicious Traffic Description, a data model to describe traffic related to malicious activities, and enables Security Operation Centers to protect domestic networks.