[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xu et al., 2023 - Google Patents

MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands

Xu et al., 2023

View PDF
Document ID
9504586566549890713
Author
Xu X
Fu C
Du X
Publication year
Publication venue
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses

External Links

Snippet

In recent years, intelligent and automated device control features have led to a significant increase in the adoption of smart home IoT systems. Each IoT device sends its events to (and receives commands from) the corresponding IoT server/platform, which executes …
Continue reading at dl.acm.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Touqeer et al. Smart home security: challenges, issues and solutions at different IoT layers
Panchal et al. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
Rondon et al. Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
KR101369727B1 (en) Apparatus and method for controlling traffic based on captcha
Abed et al. Review of security issues in Internet of Things and artificial intelligence‐driven solutions
US20130305357A1 (en) Context Aware Network Security Monitoring for Threat Detection
Hamza et al. IoT network security: requirements, threats, and countermeasures
Farooq et al. IoT smart homes security challenges and solution
James IoT cybersecurity based smart home intrusion prevention system
Vaccari et al. Evaluating security of low-power internet of things networks
WO2017164980A1 (en) Identifying and trapping wireless based attacks on networks using deceptive network emulation
Rudo et al. Consumer UAV cybersecurity vulnerability assessment using fuzzing tests
Nkuba et al. Riding the IoT wave with VFuzz: discovering security flaws in smart homes
Fu et al. Iot phantom-delay attacks: Demystifying and exploiting iot timeout behaviors
Mandalari et al. Protected or porous: A comparative analysis of threat detection capability of IoT safeguards
CN115883170A (en) Network flow data monitoring and analyzing method and device, electronic equipment and storage medium
Xu et al. MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands
US20170085577A1 (en) Computer method for maintaining a hack trap
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Gromov et al. Tackling Multiple Security Threats in an IoT Environment
Demetriou et al. Guardian of the HAN: Thwarting mobile attacks on smart-home devices using OS-level situation awareness
Balogh et al. LAN security analysis and design
Makaroff et al. Intrusion detection systems for community wireless mesh networks
Rattanalerdnusorn et al. IoTDePT: Detecting security threats and pinpointing anomalies in an IoT environment
Trabelsi Investigating The Robustness Of IoT Security Cameras Against Cyber Attacks