Rondon et al., 2022 - Google Patents
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspectiveRondon et al., 2022
View PDF- Document ID
- 2349182727803305118
- Author
- Rondon L
- Babun L
- Aris A
- Akkaya K
- Uluagac A
- Publication year
- Publication venue
- Ad Hoc Networks
External Links
Snippet
As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the- shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed …
- 238000011160 research 0 abstract description 72
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rondon et al. | Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective | |
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Heartfield et al. | A taxonomy of cyber-physical threats and impact in the smart home | |
Makhdoom et al. | Anatomy of threats to the internet of things | |
Miloslavskaya et al. | Internet of Things: information security challenges and solutions | |
EP3535657B1 (en) | Extracting encryption metadata and terminating malicious connections using machine learning | |
Alcaraz et al. | Critical control system protection in the 21st century | |
Batalla et al. | Deployment of smart home management system at the edge: mechanisms and protocols | |
Bhuyan et al. | A survey on blockchain, SDN and NFV for the smart-home security | |
Hadar et al. | A lightweight vulnerability mitigation framework for IoT devices | |
Kelly et al. | Testing and hardening IOT devices against the Mirai botnet | |
Wang et al. | XLF: A cross-layer framework to secure the internet of things (iot) | |
Yang et al. | A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice | |
Chhetri et al. | Identifying vulnerabilities in security and privacy of smart home devices | |
Sisodia | On the state of internet of things security: Vulnerabilities, attacks, and recent countermeasures | |
US20180097821A1 (en) | Wireless portable personal cyber-protection device | |
Miloslavskaya et al. | Ensuring information security for internet of things | |
Mudgerikar et al. | Iot attacks and malware | |
Demetriou et al. | Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Srivastava et al. | Emerging technology IoT and OT: overview, security threats, attacks and countermeasures | |
Wells | Better practices for IoT smart home security | |
Strba | Internet of Things security: Ongoing threats and proposed solutions | |
Gupta et al. | Cyber threat analysis of consumer devices | |
Puche Rondon | Novel Attacks and Defenses for Enterprise Internet-of-Things (E-IoT) Systems |