Proshkin et al., 2020 - Google Patents
Developing models of IoT infrastructures to identify vulnerabilities and analyse threatsProshkin et al., 2020
View PDF- Document ID
- 18300182721748366607
- Author
- Proshkin N
- Basan E
- Lapina M
- Klepikova A
- Lapin V
- Publication year
- Publication venue
- IOP Conference Series: Materials Science and Engineering
External Links
Snippet
This article describes the developing stands of typical IoT infrastructure Technologies, which are designed to identify vulnerabilities and analyse potential threats. Scenarios of attacks typical for such systems have been developed, and the consequences of implementing …
- 238000004891 communication 0 description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zaminkar et al. | SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism | |
| Nazir et al. | Survey on wireless network security | |
| Srivastava et al. | Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects | |
| US11323953B2 (en) | Rogue base station router detection with machine learning algorithms | |
| Ijaz et al. | Smart cities: A survey on security concerns | |
| Santos et al. | A flow-based intrusion detection framework for internet of things networks | |
| Lim et al. | Wireless intrusion detection and response | |
| Proshkin et al. | Developing models of IoT infrastructures to identify vulnerabilities and analyse threats | |
| Abbasi et al. | Security in the internet of things application layer: requirements, threats, and solutions | |
| Tang et al. | Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes | |
| Ul Rehman et al. | A study of smart home environment and its security threats | |
| Saxena et al. | Impact evaluation of malicious control commands in cyber-physical smart grids | |
| McLaughlin et al. | Secure communications in smart grid: Networking and protocols | |
| Caviglione et al. | Analysis of human awareness of security and privacy threats in smart environments | |
| Lovinger et al. | Detection of wireless fake access points | |
| Lu et al. | SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames | |
| Anthi | Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem | |
| Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
| Banerjee et al. | A review on different Intrusion Detection Systems for MANET and its vulnerabilities | |
| Barraud et al. | 5g suci catcher: Attack and detection | |
| Visoottiviseth et al. | Piti: Protecting internet of things via intrusion detection system on raspberry pi | |
| Doan et al. | Threat modeling for ML-based topology prediction in vehicular edge computing architecture | |
| Banik et al. | Intrusion detection system in smart grid-a review | |
| Ula et al. | Towards the secure Internet of Things: Threats and solution | |
| RU2703329C1 (en) | Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them |