The internet of things: Protecting network assets and infrastructure
The rapid proliferation of IoT devices introduces serious cyber security risks.
The rapid proliferation of IoT devices introduces serious cyber security risks.
The Internet of Things (IoT) is revolutionising the way we live and work, connecting everything from household appliances to critical infrastructure systems. However, the rapid proliferation of IoT devices introduces serious cyber security risks. Many devices lack basic security protections, making them vulnerable to cyber threats, including botnets, data breaches, and system takeovers.
A well-documented example is the 2016 Mirai botnet attack, which exploited insecure IoT devices to launch a Distributed Denial of Service (DDoS) attack, disrupting major online services. These incidents highlight the urgent need for robust IoT security measures.
The Australian Government has taken steps to address IoT security, including the , which mandates manufacturers to provide a statement of compliance outlining device security measures.
However, enforcing compliance remains a challenge. Without strong enforcement mechanisms, manufacturers may prioritise cost savings over security, leaving businesses and consumers vulnerable.
A regulatory approach that balances compliance requirements with industry feasibility is essential. Instead of imposing costly and complex device-level security, an alternative approach - network-level security - offers a practical, scalable solution.
Security experts advocate two primary approaches to IoT security:
Device-Level Security:Â Embeds security features into each device. While effective, this approach is expensive, difficult to implement universally, and often resisted by manufacturers due to cost and complexity.
Network-Level Security:Â Places security controls at the network level, enabling operators to enforce security policies without requiring changes to individual devices. This approach is lighter, more flexible, and cost-effective, as it does not require modifying device hardware or software.
A practical implementation of network-level security is the Manufacturer Usage Description (MUD) standard ().
The MUD standard, developed by the Internet Engineering Task Force (IETF), requires manufacturers to declare the expected behaviour of their devices. This allows network operators to enforce policies that limit unnecessary or potentially harmful device communications.
Key Benefits of MUD:
Locks down authorised communications by restricting devices to expected network behaviours.
Reduces attack surfaces by preventing unspecified connections.
Minimises security costs by shifting protection to network operators instead of manufacturers.
Implementation of MUD Policies:
For Large Organisations (e.g., government agencies and infrastructure operators): Network administrators can configure switches and routers to enforce security policies based on known MUD profiles.
For 91³ÉÈ˰涶Òô Networks: Internet Service Providers (ISPs) can offer managed security services, applying MUD-based protections at home network gateways.
This approach does not require modifications to devices, making it a low-cost, high-impact solution. That said, device-level protections can complement network-level approaches, further enhancing overall security.
Consider a government department deploying 7,000 security cameras across its facilities. With MUD implementation:
The expected behaviour of each camera is defined, enforced, and monitored.
Any anomalous activity (e.g., receiving commands or sending data to servers outside Australia) triggers an alert, enabling rapid threat mitigation.
Network policies automatically block any unauthorised communication.
This model ensures security without requiring costly modifications to individual cameras.
To achieve widespread adoption of network-level security, a phased enforcement strategy is recommended:
Stage 1 (2025-2026):Â Awareness and education for manufacturers and network operators.
Stage 2 (2026-2027):Â Voluntary adoption of MUD, with government incentives (e.g., procurement preferences for compliant manufacturers).
Stage 3 (2027-2028):Â Regulatory enforcement requiring IoT manufacturers to comply with published security expectations.
Additionally, third-party certification bodies could verify manufacturer compliance, similar to existing testing frameworks for telecommunications and mobile devices.
IoT security is a pressing challenge that demands proactive policy measures. While device-level security is costly and difficult to enforce, network-level security offers a viable, scalable alternative. By mandating MUD adoption, the Australian Government can:
Enhance IoT security in public and private sectors.
Protect national infrastructure from escalating cyber threats.
Position Australia as a global leader in cyber security policy.
A secure IoT ecosystem will strengthen national resilience, safeguard businesses and consumers, and set a benchmark for international best practices.
For further insight into IoT security and regulatory frameworks, we recommend the following documents:
2016 Mirai Botnet Attack
The 2016 Mirai botnet attack was a large-scale cyber attack that leveraged vulnerabilities in Internet of Things (IoT) devices to create a botnet. The botnet, known as Mirai, infected thousands of IoT devices with weak security settings, such as default passwords and open ports, and used them to launch a Distributed Denial of Service (DDoS) attack against major websites and online services. The attack disrupted services such as Twitter, Netflix, and Reddit, highlighting the risks of unsecured IoT ecosystems.
Distributed Denial of Service (DDoS) Attack
A Distributed Denial of Service (DDoS) attack is a cyber attack in which multiple compromised devices, often part of a botnet, are used to flood a target system, network, or website with excessive traffic. This overwhelms the target, rendering it inaccessible to legitimate users. DDoS attacks can disrupt businesses, government agencies, and critical infrastructure, making them a significant cyber security threat. The Mirai botnet attack is one of the most notable examples of a large-scale DDoS attack.
Australian Cyber Security Act 2024
The Australian Cyber Security Act 2024 is a legislative framework introduced to enhance the cybersecurity posture of Australian businesses and government entities. The Act mandates stricter security measures for Internet of Things (IoT) devices, requires compliance statements from manufacturers, and establishes regulatory enforcement mechanisms to ensure device security. The Act aims to mitigate cyber risks by enforcing security standards, promoting threat intelligence sharing, and enhancing national cyber security resilience.
Manufacturer Usage Description (MUD) Standard
The Manufacturer Usage Description (MUD) standard is a security framework developed by the Internet Engineering Task Force (IETF) to enhance IoT device security at the network level. The MUD standard requires IoT manufacturers to publish expected device behaviour, allowing network operators to enforce policies that restrict unnecessary or unauthorized communications. By limiting a device’s interactions to only essential services, MUD helps reduce attack surfaces and prevent cyber threats such as DDoS attacks and unauthorised access. The standard provides a low-cost, scalable security solution that does not require modifications to device hardware or software.