Rani et al., 2022 - Google Patents
Classification of security issues and cyber attacks in layered Internet of ThingsRani et al., 2022
View PDF- Document ID
- 649165520196527524
- Author
- Rani D
- Gill N
- Gulia P
- Publication year
- Publication venue
- Journal of Theoretical and Applied Information Technology
External Links
Snippet
ABSTARCT Internet of Things (IoT) has emerged as a very significant research area. In IoT, billions of 'things' are connected which communicate with one another over a network. While communicating among 'things', their users face several types of application and technical …
- 238000011160 research 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alferidah et al. | A review on security and privacy issues and challenges in internet of things | |
HaddadPajouh et al. | A survey on internet of things security: Requirements, challenges, and solutions | |
Lone et al. | A comprehensive study on cybersecurity challenges and opportunities in the IoT world | |
Lohachab et al. | Critical analysis of DDoS—An emerging security threat over IoT networks | |
Swessi et al. | A survey on internet-of-things security: threats and emerging countermeasures | |
Aly et al. | Enforcing security in Internet of Things frameworks: A systematic literature review | |
Deogirikar et al. | Security attacks in IoT: A survey | |
Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
Ahmed et al. | A comprehensive analysis on the security threats and their countermeasures of IoT | |
Islam et al. | An analysis of cybersecurity attacks against internet of things and security solutions | |
Humayun | Industry 4.0 and cyber security issues and challenges | |
Kumar et al. | Review on security and privacy concerns in Internet of Things | |
Damghani et al. | Classification of attacks on IoT | |
Mukherjee et al. | Security and privacy issues and solutions for fog | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Gupta et al. | Security challenges in adopting internet of things for smart network | |
Chimuco et al. | Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation | |
Khalid et al. | Study of security and privacy issues in internet of things | |
Rani et al. | Classification of security issues and cyber attacks in layered Internet of Things | |
Zaman et al. | Towards SDN and blockchain based IoT countermeasures: a survey | |
Williams et al. | Security aspects of internet of things–a survey | |
Nair et al. | Security attacks in internet of things | |
Samani et al. | Intrusion detection system for DoS attack in cloud | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Chaudhari et al. | A review on cloud security issues and solutions |