The growing number of Internet of Things (IoT) devices increases the risk of insecure and uncontrolled network communication. The Manufacturer Usage Description (MUD) standard helps reduce this risk by defining network policies for known and legitimate device connections. However, writing MUD profiles manually is time-consuming and often inconsistent, making it difficult for manufacturers to keep up with the scale of IoT development. In this project, we present an automated approach that uses Retrieval-Augmented Generation (RAG) with large language models (LLMs) to generate MUD profiles directly from device documentation and source code. We tested the framework in a simulated network environment that mimics real IoT behavior, extracting relevant communication facts and converting them into a complete and standards-compliant MUD profile. Our results show that this approach can make MUD generation faster, more accurate, and more practical, ultimately improving the security of IoT devices in a simple and efficient way.

The growing number of Internet of Things (IoT) devices increases the risk of insecure and uncontrolled network communication. The Manufacturer Usage Description (MUD) standard helps reduce this risk by defining network policies for known and legitimate device connections. However, writing MUD profiles manually is time-consuming and often inconsistent, making it difficult for manufacturers to keep up with the scale of IoT development. In this project, we present an automated approach that uses Retrieval-Augmented Generation (RAG) with large language models (LLMs) to generate MUD profiles directly from device documentation and source code. We tested the framework in a simulated network environment that mimics real IoT behavior, extracting relevant communication facts and converting them into a complete and standards-compliant MUD profile. Our results show that this approach can make MUD generation faster, more accurate, and more practical, ultimately improving the security of IoT devices in a simple and efficient way.

The White-Box Approach to IoT Security: Generating MUD Profiles with RAG

ALMENHALI, ABDULLA RASHEED ABDULLA SAEED
2024/2025

Abstract

The growing number of Internet of Things (IoT) devices increases the risk of insecure and uncontrolled network communication. The Manufacturer Usage Description (MUD) standard helps reduce this risk by defining network policies for known and legitimate device connections. However, writing MUD profiles manually is time-consuming and often inconsistent, making it difficult for manufacturers to keep up with the scale of IoT development. In this project, we present an automated approach that uses Retrieval-Augmented Generation (RAG) with large language models (LLMs) to generate MUD profiles directly from device documentation and source code. We tested the framework in a simulated network environment that mimics real IoT behavior, extracting relevant communication facts and converting them into a complete and standards-compliant MUD profile. Our results show that this approach can make MUD generation faster, more accurate, and more practical, ultimately improving the security of IoT devices in a simple and efficient way.
2024
The White-Box Approach to IoT Security: Generating MUD Profiles with RAG
The growing number of Internet of Things (IoT) devices increases the risk of insecure and uncontrolled network communication. The Manufacturer Usage Description (MUD) standard helps reduce this risk by defining network policies for known and legitimate device connections. However, writing MUD profiles manually is time-consuming and often inconsistent, making it difficult for manufacturers to keep up with the scale of IoT development. In this project, we present an automated approach that uses Retrieval-Augmented Generation (RAG) with large language models (LLMs) to generate MUD profiles directly from device documentation and source code. We tested the framework in a simulated network environment that mimics real IoT behavior, extracting relevant communication facts and converting them into a complete and standards-compliant MUD profile. Our results show that this approach can make MUD generation faster, more accurate, and more practical, ultimately improving the security of IoT devices in a simple and efficient way.
IoT
MUD
RAG
Policy Generation
White-Box Analysis
File in questo prodotto:
File Dimensione Formato  
AbdullaAlmenhali_Cybersecurity_MsC_Thesis__UniPD.pdf

accesso aperto

Dimensione 1.15 MB
Formato Adobe PDF
1.15 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/101988