Ariffin et al., 2021 - Google Patents
Configuring Local Rule of Intrusion Detection System in Software Defined IoT TestbedAriffin et al., 2021
View PDF- Document ID
- 1669768555336955079
- Author
- Ariffin S
- Le C
- Wahab N
- Publication year
- Publication venue
- 2021 26th IEEE Asia-Pacific Conference on Communications (APCC)
External Links
Snippet
IoT devices are considered the next technology in many areas in economy, industrial as well as daily life. The increasing popularity of these IoT devices increase the vulnerabilities and security issues concerning the IoT network. Maintaining the security has become the priority …
- 238000001514 detection method 0 title abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhayo et al. | A time-efficient approach toward DDoS attack detection in IoT network using SDN | |
| Cheema et al. | [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review | |
| Nobakht et al. | A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow | |
| Bull et al. | Flow based security for IoT devices using an SDN gateway | |
| Dayal et al. | Research trends in security and DDoS in SDN | |
| Krishnan et al. | SDN/NFV security framework for fog‐to‐things computing infrastructure | |
| US7409714B2 (en) | Virtual intrusion detection system and method of using same | |
| Su et al. | Detecting p2p botnet in software defined networks | |
| EP3414663A1 (en) | Automated honeypot provisioning system | |
| Mahmood et al. | S‐DPS: An SDN‐based DDoS protection system for smart grids | |
| US20250317466A1 (en) | System and Method for Improving Cybersecurity of a Network | |
| Johnson et al. | Soar4der: security orchestration, automation, and response for distributed energy resources | |
| Anthi | Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem | |
| Patrice et al. | A novel mechanism for detection of address resolution protocol spoofing attacks in large-scale software-defined networks | |
| Trabelsi | Investigating the robustness of IoT security cameras against cyber attacks | |
| Ouaissa et al. | Analyzing and Mitigating Attacks in IoT Smart Home Using a Threat Modeling Approach-Based STRIDE. | |
| Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot | |
| Ariffin et al. | Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed | |
| Kunal et al. | A secure software defined networking for distributed environment | |
| Balogh et al. | LAN security analysis and design | |
| Prabhu et al. | Network intrusion detection system | |
| Jenny et al. | SDN-Based Security for Smart Devices Against Denial of Service Attacks | |
| Alshaya | Software-Defined Networking Security Techniques and the Digital Forensics of the SDN Control Plane | |
| Abhijith et al. | First Level Security System for Intrusion Detection and Prevention in LAN | |
| Abazari et al. | Teaching software‐defined network security through malicious tenant detection |