Internet of malicious things: Correlating active and passive measurements for inferring and characterizing internet-scale unsolicited iot devices

F Shaikh, E Bou-Harb, N Neshenko… - IEEE …, 2018 - ieeexplore.ieee.org
Advancements in computing, communication, and sensing technologies are making it
possible to embed, control, and gather vital information from tiny devices that are being …

A first empirical look on internet-scale exploitations of IoT devices

M Galluscio, N Neshenko, E Bou-Harb… - 2017 IEEE 28th …, 2017 - ieeexplore.ieee.org
Technological advances and innovative business models led to the modernization of the
cyber-physical concept with the realization of the Internet of Things (IoT). While IoT envisions …

A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities

S Torabi, E Bou-Harb, C Assi, M Debbabi - Forensic Science International …, 2020 - Elsevier
The analysis of large-scale cyber attacks, which utilized millions of exploited Internet of
Things (IoT) devices to perform malicious activities, highlights the significant role of …

[图书][B] Cyber threat intelligence for the internet of things

E Bou-Harb, N Neshenko - 2020 - Springer
Advancements in computing, communication, and sensing technologies are making it
possible to embed, control, and gather vital information from tiny devices that are being …

Internet-scale insecurity of consumer internet of things: An empirical measurements perspective

A Mangino, MS Pour, E Bou-Harb - ACM Transactions on Management …, 2020 - dl.acm.org
The number of Internet-of-Things (IoT) devices actively communicating across the Internet is
continually increasing, as these devices are deployed across a variety of sectors, constantly …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

Inferring, characterizing, and investigating internet-scale malicious iot device activities: A network telescope perspective

S Torabi, E Bou-Harb, C Assi… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Recent attacks have highlighted the insecurity of the Internet of Things (IoT) paradigm by
demonstrating the impacts of leveraging Internet-scale compromised IoT devices. In this …

Inferring and investigating IoT-generated scanning campaigns targeting a large network telescope

S Torabi, E Bou-Harb, C Assi… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The analysis of recent large-scale cyber attacks, which leveraged insecure Internet of Things
(IoT) devices to perform malicious activities on the Internet, highlighted the rise of IoT …

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns

MS Pour, E Bou-Harb, K Varma, N Neshenko… - Digital …, 2019 - Elsevier
The resource-constrained and heterogeneous nature of Internet-of-Things (IoT) devices
coupled with the placement of such devices in publicly accessible venues complicate efforts …

Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Proceedings of the 14th …, 2019 - dl.acm.org
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructure realms. Several challenges impede addressing IoT …