Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks

P Chaudhary, B Gupta, AK Singh - Telecommunication Systems, 2022 - Springer
IoT platform has become the fascinating attacks surface to launch various types of cyber-…
We prepare the dataset through simulating the IoT network by connecting different IoT devices …

Anomaly behavior analysis for IoT network nodes

J Pacheco, V Benitez, L Félix - … Conference on Future Networks and …, 2019 - dl.acm.org
… , IoT components such as Gateways, usually referred as IoT … to increase the attack surface,
preventing the IoT to deliver … to detect when an IoT network node is being compromised. Our …

IoT security framework for smart cyber infrastructures

J Pacheco, S Hariri - 2016 IEEE 1st International workshops on …, 2016 - ieeexplore.ieee.org
… due to the significant increase in the attack surface, complexity, heterogeneity and number of
… ) to launch attacks. We consider two sides of the IoT network, one for local network (insiders…

Towards a framework for testing the security of IoT devices consistently

G Lally, D Sgandurra - … , ETAA 2018, Barcelona, Spain, September 7, 2018 …, 2018 - Springer
… OWASP IoT attack surface mappings [12] with the aim of making the security testing of IoT
devices … line as outlined by the Device Network Services attack surface mappings. As per the …

Adriot: An edge-assisted anomaly detection framework against iot-based network attacks

R Li, Q Li, J Zhou, Y Jiang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… an accessible attack surface for network attackers. On one hand, a large proportion of IoT
mechanisms; on the other hand, though IoT market size is anticipated to reach 54 billion …

Identifying attack surfaces in the evolving space industry using reference architectures

M Bradbury, C Maple, H Yuan… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
… and privacy aspects of Internet of Things, including wireless sensor networks, intelligent …
aspects of IoT, including internet of bionano things, vehicular communication networks, user …

Amplified reflection ddos attacks over iot mirrors: A saturation analysis

AT Vasques, JJC Gondim - … Networks and Power Systems …, 2019 - ieeexplore.ieee.org
IoT have set DDoS attacks to new standards prompting concerns over IoT’s offered attack
surface… With that motivation, different kinds of typical IoT devices (Raspberry Pi, ADSL gateway …

Sybil attack in IOT: Modelling and defenses

A Rajan, J Jithish, S Sankaran - 2017 International conference …, 2017 - ieeexplore.ieee.org
… The attack surface includes VANET’s, distributed voting and storage applications in P2P …
parameters as input to secure IoT networks against sybil attacks. We calculate trust values for all …

Reducing USB attack surface: A lightweight authentication and delegation protocol

A Mahboubi, S Camtepe… - … Conference on Smart …, 2018 - ieeexplore.ieee.org
… connected to a corporate network using a USB connection … However, unlike network
communications, USB connection … equilibrium in air-gapped networks. The proposed protocol is …

IoT botnets: Characteristics, exploits, attack capabilities, and targets

L McNulty, VG Vassilakis - … , Networks and Digital Signal …, 2022 - ieeexplore.ieee.org
… of these applications to reduce the potential of the available attack surface and vulnerabilities
exploitation. In this report, a review of 46 recent IoT botnets is presented. In particular, we …