Abstract
This demo focuses on demonstrating features of a new system to protect IoT devices in customer premises at the ISP level. The core of the system is deployed as a Virtual Network Function (VNF) within the ISP network, and is based on the Manufacturer Usage Description (MUD) framework, a white-list IoT protection scheme that has been proposed in recent years.As MUD is designed for on-premise deployment, the system makes the necessary adaptations to enable its deployment outside the customer premise. Moreover, the system includes a mechanism to distinguish between flows of different devices at the ISP level despite the fact that most home networks (and their IoT devices) are behind a NAT and all the flows from the same home come out with the same source IP address.Our demo follows closely a proof-of-concept that we have done with a large national level ISP, showing how our system can identify the various IoT devices that are connected to the network and detecting any unauthorized communications.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020 |
| Subtitle of host publication | Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781728149738 |
| DOIs | |
| State | Published - Apr 2020 |
| Event | 2020 IEEE/IFIP Network Operations and Management Symposium, NOMS 2020 - Budapest, Hungary Duration: 20 Apr 2020 → 24 Apr 2020 |
Publication series
| Name | Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020 |
|---|
Conference
| Conference | 2020 IEEE/IFIP Network Operations and Management Symposium, NOMS 2020 |
|---|---|
| Country/Territory | Hungary |
| City | Budapest |
| Period | 20/04/20 → 24/04/20 |
Bibliographical note
Publisher Copyright:© 2020 IEEE.
Fingerprint
Dive into the research topics of 'Demo: NFV-based IoT Security at the ISP Level'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver