02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48<br />

simpler way to approach these problems. A common denominator that can cope with the breadth<br />

of platforms and devices that IoT will present.<br />

That common denominator could well be an infrastructure that is already prevalent across all IP<br />

networks, whether they be corporate network, public clouds, next generation data centers and<br />

even the Internet. That infrastructure would be the DHCP, DNS and IP address management<br />

(DDI) infrastructure which for the past 30 years has provided internet scale to all IP connected<br />

devices. How could this ubiquitous infrastructure be applied to the address the challenges of IoT?<br />

Device Identification and Classification<br />

Starting with device identification and classification. IP connected IoT devices are going to require<br />

an IP address. If the addresses are statically provisioned, organizations will need an IP address<br />

management platform to manage the IP address space, even more so given the dramatic increase<br />

in consumption of addresses. Even if the devices are going to use IPv6 where address space is<br />

not constrained, managing and tracking those addresses is an important operational need.<br />

Similarly, if the devices obtain their addresses dynamically, they will still need a DHCP (Dynamic<br />

Host Configuration Protocol) server to provide those addresses. In either case the centralized<br />

platforms that manage the IP address space will have a comprehensive view of what devices are<br />

on the network. More so, through the static address management process there is the opportunity<br />

to classify the device at the moment of provisioning. In the case of DHCP, the DHCP request<br />

from the IoT device provides a fingerprint that would enable the DHCP server to classify what<br />

devices is requesting an address. There does not seem to be any better common way to identify<br />

and classify the broad range of IoT devices than with an IP address management and DHCP<br />

platform.<br />

Threat Detection<br />

In the case of threat detection there is an advantage to protecting devices over users. Anomaly<br />

detection for users is difficult because it’s hard to predict what a user’s normal behaviour is.<br />

Machines on the other hand tend to be far more predictable which means anomaly detection<br />

could be a fruitful way of identifying compromised machines. One common means of applying<br />

anomaly detection across the breadth of IoT devices would be to leverage their DNS activity.<br />

Since statically configuring applications and services is impractical and not scalable, most IoT<br />

devices will leverage DNS to dynamically locate the services and platforms it needs to interact<br />

with. DNS provides that flexibility enabling services to be re-located between networks whilst<br />

maintaining a common point of reference: the fully qualified domain.<br />

On this premise, it’s possible to monitor and model the services the IoT device seeks to<br />

communicate with. If for example there is an IoT thermostat made by a manufacturer in Germany,<br />

it may communicate back to the manufacturer for software updates, leveraging DNS to resolve<br />

the address of the update server in Germany. DNS servers could model that behaviour and if the<br />

device began to deviate from its typical pattern of behaviour, perhaps by attempting to resolve

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!