[go: up one dir, main page]

Proshkin et al., 2020 - Google Patents

Developing models of IoT infrastructures to identify vulnerabilities and analyse threats

Proshkin et al., 2020

View PDF
Document ID
18300182721748366607
Author
Proshkin N
Basan E
Lapina M
Klepikova A
Lapin V
Publication year
Publication venue
IOP Conference Series: Materials Science and Engineering

External Links

Snippet

This article describes the developing stands of typical IoT infrastructure Technologies, which are designed to identify vulnerabilities and analyse potential threats. Scenarios of attacks typical for such systems have been developed, and the consequences of implementing …
Continue reading at iopscience.iop.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Zaminkar et al. SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism
Nazir et al. Survey on wireless network security
Srivastava et al. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
US11323953B2 (en) Rogue base station router detection with machine learning algorithms
Ijaz et al. Smart cities: A survey on security concerns
Santos et al. A flow-based intrusion detection framework for internet of things networks
Lim et al. Wireless intrusion detection and response
Proshkin et al. Developing models of IoT infrastructures to identify vulnerabilities and analyse threats
Abbasi et al. Security in the internet of things application layer: requirements, threats, and solutions
Tang et al. Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Ul Rehman et al. A study of smart home environment and its security threats
Saxena et al. Impact evaluation of malicious control commands in cyber-physical smart grids
McLaughlin et al. Secure communications in smart grid: Networking and protocols
Caviglione et al. Analysis of human awareness of security and privacy threats in smart environments
Lovinger et al. Detection of wireless fake access points
Lu et al. SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
Anthi Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem
Thankappan et al. A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
Banerjee et al. A review on different Intrusion Detection Systems for MANET and its vulnerabilities
Barraud et al. 5g suci catcher: Attack and detection
Visoottiviseth et al. Piti: Protecting internet of things via intrusion detection system on raspberry pi
Doan et al. Threat modeling for ML-based topology prediction in vehicular edge computing architecture
Banik et al. Intrusion detection system in smart grid-a review
Ula et al. Towards the secure Internet of Things: Threats and solution
RU2703329C1 (en) Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them