INXU: A Flow-Based Intrusion Prevention System for Home IoT Networks

  • Sávyo V. Morais UFRJ
  • Claudio M. Farias UFRJ


Due to the low resources and maintainability in home Internet of Things (IoT) devices, they can represent a risk to end-user’s security and privacy. Several proposals tried to manage new vulnerabilities in this scenario, but it is difficult to keep signatures updated or identify anomalous traffic. To reinforce home IoT security, we propose INXU, a flow-based Intrusion Prevention System that protects home IoT devices by blocking traffic related to well known malicious activities. INXU introduces the concept of Malicious Traffic Description (MTD), a data-model to describe traffic related to malicious activities that enables Security Experts to protect home networks and keeps end-user’s privacy. Experiments using Mirai botnet have shown the efficacy of our solution.


Al-Shaboti, M., Welch, I., Chen, A., and Mahmood, M. A. (2018). Towards secure smart home iot: Manufacturer and user network access control framework. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pages 892–899.

Garcia-Morchon, O., Kumar, S., and Sethi, M. (2019). Internet of Things (IoT) Security: State of the Art and Challenges. RFC 8576.

Goutam, S. (2019). Hestia: Simple least privilege network policies for smart homes. Master’s thesis, North Carolina State University.

Habibi Gharakheili, H., Sivanathan, A., Hamza, A., and Sivaraman, V. (2019). Network-level security for the internet of things: Opportunities and challenges. Computer, 52(8):58–62.

Jonsdottir, G., Wood, D., and Doshi, R. (2017). IoT network monitor. In 2017 IEEE MIT Undergraduate Research Technology Conference (URTC), pages 1–5.

Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J. (2017). DDoS in the IoT: Mirai and Other Botnets. Computer, 50(7):80–84.

Kramp, T., Van Kranenburg, R., and Lange, S. (2013). Introduction to the internet of things. In Enabling Things to Talk, pages 1–10. Springer, Berlin, Heidelberg, Berlin, Heidelberg.

Lear, E., Droms, R., and Romascanu, D. (2019). Manufacturer Usage Description Specification. RFC 8520.

Marzano, A., Alexander, D., Fazzion, E., Fonseca, O., Cunha, I., Hoepers, C., Steding-Jessen, K., Chaves, M. H. P. C., Guedes, D., and Jr., W. M. (2018). Monitoramento e caracterização de botnets bashlite em dispositivos iot. In Anais do XXXVI Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, Porto Alegre, RS, Brasil. SBC.

Mozzaquatro, B. A., Jardim-Goncalves, R., and Agostinho, C. (2015). Towards a reference ontology for security in the Internet of Things. In 2015 IEEE International Workshop on Measurements Networking (M N), pages 1–6.

OWASP (2018). Owasp top 10 internet of things 2018. [link]. Acesso em 10/01/2020.

Schutijser, C. (2018). Towards automated ddos abuse protection using mud device profiles. Master’s thesis, University of Twente.

Wan, Y., Xu, K., Xue, G., and Wang, F. (2020). IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pages 874–883.
Como Citar

Selecione um Formato
MORAIS, Sávyo V.; FARIAS, Claudio M.. INXU: A Flow-Based Intrusion Prevention System for Home IoT Networks. In: CONCURSO DE TESES E DISSERTAÇÕES - SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 22. , 2022, Santa Maria. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2022 . p. 33-40. DOI: