Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data

F Zhang, HADE Kodituwakku… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The growing number of attacks against cyber-physical systems in recent years elevates the
concern for cybersecurity of industrial control systems (ICSs). The current efforts of ICS …

Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

Detection of malicious and low throughput data exfiltration over the DNS protocol

A Nadler, A Aminov, A Shabtai - Computers & Security, 2019 - Elsevier
In the presence of security countermeasures, a malware designed for data exfiltration must
use a covert channel to achieve its goal. The Domain Name System (DNS) protocol is a …

Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

Bus: A blockchain-enabled data acquisition scheme with the assistance of uav swarm in internet of things

A Islam, SY Shin - IEEE Access, 2019 - ieeexplore.ieee.org
This paper presents a blockchain enabled secure data acquisition scheme utilizing an
unmanned aerial vehicle (UAV) swarm where data are collected from the Internet of Things …

10 years of IoT malware: A feature-based taxonomy

B Vignau, R Khoury, S Hallé - 2019 IEEE 19th International …, 2019 - ieeexplore.ieee.org
Over the past decade, there has been a rapidly growing interest in IoT-connected devices.
But as is usually the case with computer systems and networks, malicious individuals soon …

A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures

O Yousuf, RN Mir - Information & Computer Security, 2019 - emerald.com
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires
new types of architectures and protocols compared to traditional networks. Security is an …