MICS Capstone Project Summer 2021

The Internet of Secure Things (IoSTings)

Our team IoSTings designed a new methodology that safeguards IoT devices from malicious attacks.

Our Product

Our solution does not require modifying a device’s hardware or software.  Instead, our non-invasive side-channel technique allows us to monitor, detect and react to malware by using:

  1. Power Consumption
  2. Network Traffic

By correlating power consumption and network traffic, we can build a device profile to detect anomalous behavior.   

For our capstone project, we built a fully operational proof of concept that delivers:

  1. Custom hardened hardware for data acquisition
  2. Backend software and control plane
  3. Rest-API for compatible alerting system

Ransomware Image

Why it Matters

By 2025, the number of internet-connected devices used globally is predicted to grow to 55.9 billion. However, currently, no government security baselines regulate or certify the security of Internet of Things (IoT) devices. As a result, IoT manufactures are not required to build security capabilities in their devices to counter threats. 

In 2016, the Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm when it overwhelmed several high-profile targets with massive, distributed denial-of-service (DDoS) attacks. For example, the targeted website, The ​KrebsOnSecurity, sustained a DDoS attack for nearly 77 hours. The cost of the attack is estimated to be $323,973.75.

However, in the most recent ransomware attacks, threat actors have taken down major gas pipelines, affected thousands of companies, and even gained access to government and military systems.  The SolarWinds attack, the Colonial Pipeline attack, and the most recent Kaseya ransomware attack are believed to be some of the most damaging attacks the Cybersecurity industry has ever seen.

Did you know...

  • 69% of organizations do not believe the threats they are seeing can be blocked by their anti-virus software. (Ponemon Institute’s Cost of Data Breach Study)
  • The average cost savings from containing a breach in under 200 days is $1.0M.  (IBM)
  • The average cost of a ransomware attack on businesses is $133,000. (SafeAtLast)
  • IoT devices experience an average of 5,200 attacks per month. (Symantec)

This gives us a great opportunity in this growing market.  We recognize these are problems our solution can solve - IoSTings will bring our customers value by using power consumption and network telemetry to detect Zero-Day attacks.

IoSTings Architecture

For our capstone project, we built a fully operational proof-of-concept that delivers:

  1. Several IoT devices (custom and commercial) which use power and network
  2. Custom-hardened hardware to monitor power and network telemetry
  3. An integration layer to aggregate data from an enormous number of devices 
  4. Backend software to create baseline normal behavior profiles and detect abnormal behavior 
  5. HTML5/Grafana frontend for analyst visibility
  6. JSON/REST-API to alert administrators and to potentially trigger automated incident-response systems

IoSTings System Architecture

Our Solution

IoSTings offers to build a more cyber resilient enterprise through unique and non-obvious indicators to provide total visibility.

IoSTings Solution

IoSTings Logo
IoStings Product Image

A very special thanks to

Matthew Garrett, Philip Reiner, Ryan Liu, Sekhar Sarukkai, Atefeh Namvaryshad, David Ng, Kumud Kalia, Marco Hewston, Bradford Hegrat, Hyeong Gang, Karlton Ellies, Shelby Arnold, Andrew Jacobberger, Bruce Schneier, and The Center for Long Term Security (CLTC).

We also want to thank all of our professors, our classmates, and our families.




If you require video captions for accessibility and this video does not have captions, click here to request video captioning.

Last updated:

August 10, 2021