[go: up one dir, main page]

Ariffin et al., 2021 - Google Patents

Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed

Ariffin et al., 2021

View PDF
Document ID
1669768555336955079
Author
Ariffin S
Le C
Wahab N
Publication year
Publication venue
2021 26th IEEE Asia-Pacific Conference on Communications (APCC)

External Links

Snippet

IoT devices are considered the next technology in many areas in economy, industrial as well as daily life. The increasing popularity of these IoT devices increase the vulnerabilities and security issues concerning the IoT network. Maintaining the security has become the priority …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Bhayo et al. A time-efficient approach toward DDoS attack detection in IoT network using SDN
Cheema et al. [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review
Nobakht et al. A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow
Bull et al. Flow based security for IoT devices using an SDN gateway
Dayal et al. Research trends in security and DDoS in SDN
Krishnan et al. SDN/NFV security framework for fog‐to‐things computing infrastructure
US7409714B2 (en) Virtual intrusion detection system and method of using same
Su et al. Detecting p2p botnet in software defined networks
EP3414663A1 (en) Automated honeypot provisioning system
Mahmood et al. S‐DPS: An SDN‐based DDoS protection system for smart grids
US20250317466A1 (en) System and Method for Improving Cybersecurity of a Network
Johnson et al. Soar4der: security orchestration, automation, and response for distributed energy resources
Anthi Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem
Patrice et al. A novel mechanism for detection of address resolution protocol spoofing attacks in large-scale software-defined networks
Trabelsi Investigating the robustness of IoT security cameras against cyber attacks
Ouaissa et al. Analyzing and Mitigating Attacks in IoT Smart Home Using a Threat Modeling Approach-Based STRIDE.
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
Ariffin et al. Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed
Kunal et al. A secure software defined networking for distributed environment
Balogh et al. LAN security analysis and design
Prabhu et al. Network intrusion detection system
Jenny et al. SDN-Based Security for Smart Devices Against Denial of Service Attacks
Alshaya Software-Defined Networking Security Techniques and the Digital Forensics of the SDN Control Plane
Abhijith et al. First Level Security System for Intrusion Detection and Prevention in LAN
Abazari et al. Teaching software‐defined network security through malicious tenant detection