Вы находитесь на странице: 1из 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324482808

e-Health Wireless IDS with SIEM integration

Conference Paper · April 2018

CITATIONS READS

3 441

2 authors:

Pantaleone Nespoli Felix Gomez Marmol


University of Murcia University of Murcia
20 PUBLICATIONS   99 CITATIONS    91 PUBLICATIONS   1,484 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

COSMOS: Collaborative, Seamless and Adaptive Sentinels for the Internet of Things View project

AuthCODE View project

All content following this page was uploaded by Pantaleone Nespoli on 14 October 2018.

The user has requested enhancement of the downloaded file.


e-Health Wireless IDS with SIEM integration
Pantaleone Nespoli, Félix Gómez Mármol
University of Murcia, Spain
{pantaleone.nespoli,felixgm}@um.es

Abstract—The paper at hand presents a relevant summary first attempt to employ a Raspberry Pi as host system for a
of the work conducted in [1]. It shows how a wireless Intrusion wireless IDS, leveraging also the correlation capabilities of a
Detection System (IDS) successfully reports malicious activities to SIEM platform to report the detected anomalies.
a Security Information and Event Management (SIEM) system.
By doing so, a variety of IoT devices are protected from potential II. F RAMEWORK A RCHITECTURE
cyber-attacks. Leveraging the capabilities of the SIEM platform,
the events coming from different sources are effectively correlated At the core of the proposed architecture there is a small
and analyzed, increasing the situational awareness of the security and portable device acting as a wireless IDS. Our Raspberry
operator. Exhaustive experiments demonstrate that the proposed Pi could be deployed anywhere; its role is to monitor the
architecture is applicable to several wireless scenarios in which
wireless traffic of the surrounding area, acting as a passive
the devices are exposed to cyber intruders, like e-Health.
sensor. Such device requires certain inherent properties in
I. I NTRODUCTION order to fully satisfy the requirements in the context of IoT
As the use of Internet is growing day-by-day, another big e-Health security. First, it must be portable: following the IoT
area is emerging to use Internet as a global platform allowing concept of everywhere, anytime, users must be able to relocate
machines and smart objects to communicate, compute and the device effortlessly. Then, it must be able to perform its
coordinate, called Internet of Things (IoT). The IoT envi- duties using minimum configuration, adapting its behavior
sions a world in which everything, in our everyday life, is to different scenarios. Finally, the sensor must be easy to
connected together. Thus, some crucial application domains use: turning it on, users’ communications are protected. In
will be enhanced under this paradigm, such as health-care, addition to the local detection, attacks’ statistics are forwarded
environmental and industrial plant monitoring, and so forth [2]. to a remote SIEM server from which network administrators
In particular, the IoT paradigm has been widely applied can perform maintenance or emergency operations. Collecting
to interconnect available medical resources and to provide data stemming from different sources may be useful for
reliable, effective and smart healthcare services to the elderly administrators to figure out network characteristics in a given
and patients with chronic illnesses [3]. On the downside, the area, thus increasing the situational awareness. Using a SIEM
enormous amount of the sensitive data exchanged among these platform, the incoming events are filtered, aggregated, and
devices becomes attractive for ill-motivated entities, which correlated to distinguish between malicious activities and false
aim to collect them for inappropriate uses [4]. For example, alarms. This in turn, would help in identifying the appropriate
the privacy of patients must be ensured to prevent unau- security measures to protect those areas.
thorized identification and tracking. Furthermore, healthcare
IoT-based applications are inherently vulnerable due to two
basic aspects: (1) most of the communications are wireless,
facilitating eavesdropping attacks; (2) most of the IoT devices
are characterized by low energy and computing capabilities,
thus the usual protection schemas (e.g. cryptography) cannot
be straightforwardly enforced to ensure an appropriate security
level. Recently, at the 25th DefCon hacking conference1 ,
security researchers took on a new challenge: uncovering flaws
in dozens of biomedical devices, from pacemakers and insulin
pumps to glucose monitors. Notably, they found out that
the devices are indeed vulnerable to remote control attacks,
threatening the patients’ lives.
To address the abovementioned challenges, this work pro- Fig. 1. Wireless IDS architecture with SIEM integration.
poses a novel wireless IDS architecture which can be applied
to a variety of IoT environments, including specifically wire- Fig.1 shows a high level architecture of the proposed
less e-Health. It extends the work proposed in [5] by adding the framework. An ad-hoc Debian OS (i.e., Raspbian) optimized
wireless detection capability, considered of major importance for the Pi is used. Connected with the OS, two IDSs are
in the proposed scenario, and the integration with a SIEM used: Kismet3 and Snort4 . The former intercepts the wireless
system called OSSIM2 . The core ingredient of the proposed packets, analyzing them in order to find possible malicious
framework is the Raspberry Pi, a low powered device with activities targeting the 802.11 protocol. Then, it removes the
the peculiar features of IoT. Specifically, this work analyzes wireless encapsulation and feeds the latter which in turn
the feasibility of employing the Raspberry Pi as an IDS in a uses its powerful capabilities to detect intrusions targeting the
wireless scenario, arguing on its resources consumption and upper TCP/IP layers. Once alerts are raised, log messages are
detection capabilities. To the best our knowledge, this is the forwarded via TCP/UDP using rsyslog to OSSIM, which is in
1 https://www.defcon.org/ 3 https://www.kismetwireless.net/
2 https://www.alienvault.com/products/ossim 4 https://www.snort.org/
charge of receiving these logs, analyzing and visualizing them relevant statistics on the RAM usage of the lowmem detection
through the Web interface. algorithm for the above-mentioned rule sets are depicted in
Fig. 2. As expected, a higher number of enabled rules implies a
III. E XPERIMENTS higher memory usage, since Snort stores these rules directly in
This Section presents a relevant extract of the experimental RAM at the startup. A notable result is the curves’ shape; that
results achieved in [1], where exhaustive experiments were is, they show a trend which presents periodical spikes. These
conducted over the Raspberry Pi as Kismet and Snort’s peaks were generated by the Snort detection process which
host, measuring also the overhead introduced by the rsys- was evaluating the simulated attacks in our sub-network. As
log daemon. In our testing scenario, a laptop acting as an the attack starts, Snort analyzes the potential malicious frames
attacker exploited the vulnerabilities exhibited by a wireless so that the RAM usage increases for a certain time period.
access point to gain unauthorized access to the corresponding Then, when the detection process ends, the occupied memory
network. Subsequently, it acquired root privileges over a is freed. Another interesting feature is represented by the
smarthphone, which was also acting as a victim. For more curves’ slopes: as the number of received packets increases, the
detailed experiments’ settings and results, please refer to [1]. RAM consumption increases too. This behavior is mainly due
The performance evaluation was conducted in a shared en- to the Kismet’s mechanisms of devices tracking: during the
vironment where multiple devices communicated among them detection process, data structures are created to store relevant
using several access points. Thus, the monitor interface of information about the active devices in the surrounding area.
the Raspberry Pi captured the traffic from different networks. Specifically, the plot shows that the higher is the number of
For those frames, Snort was not able to start the detection packets, the higher is the slope (more RAM is used).
process because their payload was encrypted. Kismet, instead, The experimental results demonstrate that, even in a heavily
inspected also this traffic as its rules were focused on the loaded environment, the proposed solution is able to handle
devices’ behavior and on 802.11 header anomalies. On the and analyze the traffic efficiently. That is, we observed that
contrary, attacks performed in our sub-network were indeed the CPU usage never exceeded 5%, and the RAM usage never
detected. Malicious packets were decrypted by Kismet before reached 400 MB utilization during the 8 hours experimental
feeding Snort, which in this case could directly analyze them. window. In addition, the attacks performed were indeed de-
The tests were performed along 27 consecutive days, using tected by the wireless IDS with high accuracy, and reported
an 8 hours time window (from 10 a.m. to 6 p.m.), in which to the remote OSSIM server in a timely fashion. Thus, we can
we registered the highest amount of frames. Within the above- safely conclude that the proposed solution is suitable to protect
mentioned window, the attacker performed random attacks IoT devices from potential cyber-attacks, and more specifically
(e.g. port scanning, replay attack, etc.) against the victims it looks promising for the e-Health ecosystem protection.
with a fixed frequency. A script running on the Raspberry
IV. C ONCLUSIONS AND F UTURE W ORK
monitored the overall impact introduced by the IDSs and
the logs forwarding in terms of used system resources. In We proposed a novel wireless IDS architecture to be applied
particular, Snort was tested with different configurations to in a variety of IoT environments. In particular, we argued
argue on their resource consumption; that is, different rule on the possibility of employing it to protect the e-Health
sets (i.e. connectivity, balanced and security) and detection devices in a healthcare scenario. To support our claims, we
algorithms (i.e. lowmem, ac-bnfa and ac-split) were examined carried out extensive tests on the architecture showing that
during the experiments. The choice of the above-mentioned it is capable to protect a typical IoT environment. Future
parameters relies on the fact that they present the best overall works will explore the possibility of deploying a collaborative
performance according to the Snort developers. scenario to perform the detection duties, but also a scenario
in which the SIEM server reacts based on the acquired alerts.
Additionally, we plan to run intrusion detection experiments
over other wireless protocols, such as Bluetooth or Zigbee,
including proper medical devices.
Acknowledgments: This work has been supported by the
European Commission H2020 Programme under grant agree-
ment no. H2020-ICT-2014-2/671672 - SELFNET, by a Ramón
y Cajal research contract (RYC-2015-18210) granted by the
MINECO (Spain) and co-funded by the European Social Fund,
as well as by a Leonardo Grant 2017 for Researchers and
Cultural Creators awarded by the BBVA Foundation.
R EFERENCES
[1] P. Nespoli, “WISS: Wireless IDS for IoT with SIEM integration,” Master’s
thesis, University Federico II Naples, 2017.
[2] Y. H. Hwang, “IoT security & privacy: Threats and challenges,” in
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and
Security, ser. IoTPTS ’15. New York, NY, USA: ACM, 2015.
[3] Y. Yin, Y. Zeng, X. Chen, and Y. Fan, “The internet of things in
healthcare: An overview,” Journal of Industrial Information Integration,
vol. 1, no. Supplement C, pp. 3 – 13, 2016.
[4] K. Katzis, R. W. Jones, and G. Despotou, “The challenges of balancing
safety and security in implantable medical devices.” in ICIMTH, 2016,
pp. 25–28.
[5] A. Sforzin, F. Gómez Mármol, M. Conti, and J.-M. Bohli, “Raspberry
Fig. 2. Lowmem RAM usage comparison with different rule sets.
Pi IDS: A fruitful Intrusion Detection System for IoT,” in 13th IEEE
The CPU usage was measured and, notably, we found out International Conference on Advanced and Trusted Computing (ATC
that it never exceeded 5% during the experiments. Moreover, 2016), Toulouse, France, 2016.

View publication stats

Вам также может понравиться