Nothing Special   »   [go: up one dir, main page]

Rondon et al., 2022 - Google Patents

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

Rondon et al., 2022

View PDF
Document ID
2349182727803305118
Author
Rondon L
Babun L
Aris A
Akkaya K
Uluagac A
Publication year
Publication venue
Ad Hoc Networks

External Links

Snippet

As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the- shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Rondon et al. Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Heartfield et al. A taxonomy of cyber-physical threats and impact in the smart home
Makhdoom et al. Anatomy of threats to the internet of things
Miloslavskaya et al. Internet of Things: information security challenges and solutions
EP3535657B1 (en) Extracting encryption metadata and terminating malicious connections using machine learning
Alcaraz et al. Critical control system protection in the 21st century
Batalla et al. Deployment of smart home management system at the edge: mechanisms and protocols
Bhuyan et al. A survey on blockchain, SDN and NFV for the smart-home security
Hadar et al. A lightweight vulnerability mitigation framework for IoT devices
Kelly et al. Testing and hardening IOT devices against the Mirai botnet
Wang et al. XLF: A cross-layer framework to secure the internet of things (iot)
Yang et al. A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice
Chhetri et al. Identifying vulnerabilities in security and privacy of smart home devices
Sisodia On the state of internet of things security: Vulnerabilities, attacks, and recent countermeasures
US20180097821A1 (en) Wireless portable personal cyber-protection device
Miloslavskaya et al. Ensuring information security for internet of things
Mudgerikar et al. Iot attacks and malware
Demetriou et al. Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Srivastava et al. Emerging technology IoT and OT: overview, security threats, attacks and countermeasures
Wells Better practices for IoT smart home security
Strba Internet of Things security: Ongoing threats and proposed solutions
Gupta et al. Cyber threat analysis of consumer devices
Puche Rondon Novel Attacks and Defenses for Enterprise Internet-of-Things (E-IoT) Systems