Professional Documents
Culture Documents
Use Case
1st Nikolaos Vakakis 2nd Odysseas Nikolis 3rd Dimosthenis Ioannidis 4th Kostantinos Votis 5th Dimitrios Tzovaras
CERTH-ITI CERTH-ITI CERTH-ITI CERTH-ITI CERTH-ITI
Thessaloniki, Greece Thessaloniki, Greece Thessaloniki, Greece Thessaloniki, Greece Thessaloniki, Greece
nikovaka@iti.gr odynik@iti.gr djoannid@iti.gr kvotis@iti.gr tzovaras@iti.gr
Abstract—Today, Small and medium-sized enterprises (SME) Recent studies show not only that the percentages of small
can be considered as the new big target for cyber attacks, or medium size businesses that suffer from cyber attacks are
while the cybercrime prevention is often neglected within their quite high, but also that SMEs appear to have significant per-
environment. This paper aims to investigate the characteristics
of cybersecurity threats in the Digital Innovation Hub (DIH) ception gap when it comes to cyber awareness and prepared-
ecosystem of a Smart-Home/Office environment being constituted ness. Similarly, according to one FireEye claim 77% of all
by Small and Medium Enterprises (SMEs) that contains various cyber-crimes target SMEs. Simple endpoint protection through
smart-devices and IoT equipment, smart-grid components, em- antivirus has become by far inadequate due to the complexity
ployees workstations and medium size networking equipment.. and variety of cyber threats as well as the integration of a
As the Cyber-security in such an ecosystem is really demanding
and challenging because of the various communication layers wealth of digital technologies in business processes even of
and the different supported IoT devices, we introduce a more the smallest enterprises.
robust, resilient and effective cybersecurity solution that can be The fact that SMEs represent the vast majority of total
effortlessly tailored to each individual enterprises evolving needs businesses and that hackers consider them as easier target
and can also speedily adapt/respond to the changing cyber threat
than large enterprises, reinforce the need for new robust
landscape. Thus, this Cyber-security framework will be evaluated
through three major types of Smart-Home/Office data-sets and security mechanisms that achieve early and accurate detection
will be supported from SME/ICT clusters under the framework of attack patterns. The SPEAR H2020 project aims to develop
of the Secure and Private Smart Grid (SPEAR) H2020 project. tools that enhance the security by design and introducing
The first promising results of our work indicate the potential of cyber security prevention mechanisms in the area of smard
implementing strong defence mechanisms for SMEs environments
grids, including also smart homes (like the smart home of
within DIHs.
Index Terms—cybersecurity, anomaly detection, SME, dataset, CERTH in Thessaloniki which operates both as a living and
Smart-Home/Office environment, SPEAR, working environment). This dual nature renders the smart
home an appropriate testbed for applying advanced anomaly
I. I NTRODUCTION detection methodologies and tools with data deriving from a
Cybersecurity in SMEs is an ever growing concern due real environment that can be a powerful weapon for SMEs
to the increasing adoption of digital technologies like Cloud, security administrators support.
Computing and Internet of Things (IoT)but also the constitu- The discussion on this paper will proceed as follows:
tion of a wide range of devices (e.g. PCs, servers, mobile Section 2 describes the derived from the smart home envi-
devices, etc.) and business practices (e.g. BYOD, remote ronment, different kinds of datasets that have been collected ef-
access, use of cloud-based apps and services, etc.). In this ficiently, while in section 3 we analyse how anomaly detection
context, the increased connectivity that comes with IoT tech- techniques could be applied in these data sets. Thus we present
nologies entails also bigger attack surface for adversaries, by some advanced methods based deep learning techniques, while
leveraging security gaps of interconnected IoT devices within in section 4 the first results obtained from the previously
a smart home/office environment. One the one hand providing defined models are presented. Finally in section 5 we conclude
secure protocols can protect organization data from being with the future discussion and work.
eavesdropped, as well as from unauthorized access to their
systems or even denial of service attacks and save them from II. DATASETS
security breaches that could cost a lot in terms of capital
or customer dissatisfaction, but one the other hand security There are three kinds of datasets produced by the smart
imposes slower communications, thus it is important to find home environment, netflows dataset concerning the network
the right balance between those goals. Therefore it can be traffic of the smart home, application layer protocol dataset
understood that it is crucial to have security mechanisms that concerning the application layer protocols that are used by
can detect attacks not only in the network layer but also the smart home equipment’s communications and electricity
on the application layer and compensate for any protocol measurements dataset stemming from the measurements col-
vulnerabilities. lected by smart meters.
N. Vakakis, O. Nikolis, D. Ioannidis, K. Votis, and D. Tzovaras, “Cybersecurity in SMEs: The Smart-Home/Office Use Case,” in 2019 IEEE 24th International Work-
shop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, doi: 10.1109/camad.2019.8858471.