Why anomaly detection matters

Security measures are vital to defend and protect IoT devices and solutions, writes Pritam Shiravadekar, the product manager for value added services at Wireless Logic. It is natural to focus resource on prioritising breach prevention – everyone wants to avoid breaches – but companies mustn’t neglect detection. If they do, significant damage could be done before a breach has even been discovered. Anomaly detection must form part of a 360-degree approach to IoT security, one that empowers companies to defend, detect and react in the face of cyberthreats

According to an IBM Security/Ponemon Institute report it takes an astonishing 212 days on average to detect a data breach. All the time security compromises go undetected, damage could be done. If companies want to protect their revenue, relationships, and reputations, they cannot afford to be on the back foot when it comes to breach detection.

What is anomaly detection?

IoT devices generally sit outside enterprises’ perimeters, in unmanned environments where they can be significantly more vulnerable. Hackers could target them to take control of devices, or use them as entry points into enterprises’ systems to steal data or launch ransomware attacks. They could even use compromised devices as launchpads for attacks on other connected targets. Constant vigilance is required – once a weakness has been exposed, it could be exploited further.

To mitigate the risk, IoT devices must be secured, but they must also be monitored. Anomaly detection identifies activity that wouldn’t be considered normal. That could be more frequent, or higher levels of, data transmission. A temperature sensor, for example, might have something wrong if it suddenly starts sending data every hour instead of the expected twice a day. A device suddenly appearing to communicate from another country could be another indication of possible trouble.

businessNot all anomalies mean devices have been hacked, necessarily. A SIM may increase or cease communication for very genuine reasons and devices can simply malfunction. Either way, whether the reason is sinister or benign, companies still need to know about anomalies, and quickly. If there has been a breach, they will need to identify and isolate it to minimise any impact.

How does anomaly detection work?

IoT security begins with defence, but it is incomplete without the ability to detect potential problems and take action should they occur.

If companies don’t have visibility into their IoT devices and traffic, they won’t know if they’ve been compromised. The solution is to know what ‘normal’ looks like and then monitor connected devices so anomalies can be identified.

Anomaly detection provides visibility into IoT devices and solutions and flags any activity that needs investigation. The engines are device-agnostic and work with artificial intelligence (AI) programmes to analyse data feeds and score any potential threats.

It begins with profiling IoT network baseline behaviour, setting business rules containing thresholds to instruct the AI programme so it can learn. The programme then monitors device, network traffic and application-level behaviour.

It can flag anything it detects in real-time, so that action can then be taken. That action could be automated or not, again according to the rules. It could include throttling bandwidth to stop a device communicating into the network or isolating the device within a restricted zone. Alternatively, the anomaly could be sent for review to determine probable cause and therefore what action to take.

The AI engine can also analyse anomalies to identify types of attack. These could be distributed denial-of-service (DDoS), man-in-the-middle (MiTM) attacks, or device takeovers.

How to incorporate anomaly detection into IoT security

Too often, IoT security is thought about after solutions have been deployed. It is imperative to think about security, and anomaly detection, at the product or solution design phase. The best outcomes result from preparation, to prevent attacks ideally of course, but also to detect and react to them should they occur.

Fortunately, anomaly detection is service based, so it is fully scalable according to the size and scope of an IoT project’s initial deployment and growth over time. It can work for a single device or fleet, system wide. By working with automation, anomaly detection helps companies cost-manage and react in a timely way because they are not constrained by over-dependence on labour-hungry manual tasks.

It is important to stress again that anomaly detection is only one part of the security puzzle. It must form part of a 360-degree security model, made up of technology capabilities, standards and best practice that work together to defend, detect and react to cyber threats.

The IoT security threat landscape evolves constantly so all companies, even those who have already adopted best practices, must maintain both defensive and active measures to mitigate risks across their IoT device fleets, communications networks, data and application layers.

There are many threats to counteract including ransomware, malware, device spoofing and MiTM attacks. Companies must protect themselves against the safety, operational, financial and reputational damage that can arise from security breaches.

For these reasons, IoT security must leave nothing to chance. Companies must manage their IoT solutions’ attack surfaces to prevent unauthorised access to data, systems or devices and protect them from compromise. In this, defence is only part of the complete security picture. Detection is a second layer, whereby devices and network behaviour are monitored to spot anything out of the ordinary.

After detection, comes the capability to react, which includes quarantining and cleaning affected devices, reporting breaches and anomalies and applying corrective actions across systems. All aspects of defence, detection and reaction must be planned, understood, practised and maintained for companies to be fully equipped to face the risks that threaten their IoT solutions.

Comment on this article via X: @IoTNow_

RECENT ARTICLES

Carson City upgrades to Iteris’ advanced Vantage Apex sensors

Posted on: April 26, 2024

Iteris has announced that Carson City, Nevada has chosen to upgrade the city’s intersection detection sensors to Iteris’ Vantage Apex hybrid sensors.

Read more

Make the Intelligent Choice: Embed X103 in Smart City Outdoor Devices

Posted on: April 25, 2024

The adage “less is more” is the current state of digital transformation, starting with existing technology that has already proven successful – and then further adapting and streamlining. The “smart

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more