[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rani et al., 2022 - Google Patents

Classification of security issues and cyber attacks in layered Internet of Things

Rani et al., 2022

View PDF
Document ID
649165520196527524
Author
Rani D
Gill N
Gulia P
Publication year
Publication venue
Journal of Theoretical and Applied Information Technology

External Links

Snippet

ABSTARCT Internet of Things (IoT) has emerged as a very significant research area. In IoT, billions of 'things' are connected which communicate with one another over a network. While communicating among 'things', their users face several types of application and technical …
Continue reading at www.jatit.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Alferidah et al. A review on security and privacy issues and challenges in internet of things
HaddadPajouh et al. A survey on internet of things security: Requirements, challenges, and solutions
Lone et al. A comprehensive study on cybersecurity challenges and opportunities in the IoT world
Lohachab et al. Critical analysis of DDoS—An emerging security threat over IoT networks
Swessi et al. A survey on internet-of-things security: threats and emerging countermeasures
Aly et al. Enforcing security in Internet of Things frameworks: A systematic literature review
Deogirikar et al. Security attacks in IoT: A survey
Sinha et al. Information Security threats and attacks with conceivable counteraction
Ahmed et al. A comprehensive analysis on the security threats and their countermeasures of IoT
Islam et al. An analysis of cybersecurity attacks against internet of things and security solutions
Humayun Industry 4.0 and cyber security issues and challenges
Kumar et al. Review on security and privacy concerns in Internet of Things
Damghani et al. Classification of attacks on IoT
Mukherjee et al. Security and privacy issues and solutions for fog
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Gupta et al. Security challenges in adopting internet of things for smart network
Chimuco et al. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
Khalid et al. Study of security and privacy issues in internet of things
Rani et al. Classification of security issues and cyber attacks in layered Internet of Things
Zaman et al. Towards SDN and blockchain based IoT countermeasures: a survey
Williams et al. Security aspects of internet of things–a survey
Nair et al. Security attacks in internet of things
Samani et al. Intrusion detection system for DoS attack in cloud
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Chaudhari et al. A review on cloud security issues and solutions