Abdalla et al., 2020 - Google Patents
Testing IoT security: The case study of an ip cameraAbdalla et al., 2020
View PDF- Document ID
- 13474628560712799668
- Author
- Abdalla P
- Varol C
- Publication year
- Publication venue
- 2020 8th International Symposium on Digital Forensics and Security (ISDFS)
External Links
Snippet
While the Internet of Things (IoT) applications and devices expanded rapidly, security and privacy of the IoT devices emerged as a major problem. Current studies reveal that there are significant weaknesses detected in several types of IoT devices moreover in several …
- 241001397173 Kali <angiosperm> 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abdalla et al. | Testing IoT security: The case study of an ip camera | |
Seralathan et al. | IoT security vulnerability: A case study of a Web camera | |
Singh et al. | Hierarchical security paradigm for iot multiaccess edge computing | |
Thankappan et al. | Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review | |
US10257226B2 (en) | Identifying and trapping wireless based attacks on networks using deceptive network emulation | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Lidanta et al. | Vulnerability analysis of wireless LAN networks using penetration testing execution standard: a case study of cafes in Palembang | |
Anthi | Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem | |
Fereidouni et al. | IoT and Man-in-the-Middle Attacks | |
Lakhani et al. | Securing Wireless Networks Against Emerging Threats: An Overview of Protocols and Solutions | |
Balogh et al. | LAN security analysis and design | |
Habibi Gharakheili et al. | Cyber‐Securing IoT Infrastructure by Modeling Network Traffic | |
Asokan et al. | A Case Study Using National e-Government Portals to Investigate the Deployment of the Nmap Tool for Network Vulnerability Assessment | |
Salem et al. | Forensically analyzing IoT smart camera using MAoIDFF-IoT framework | |
Mishra et al. | Investigating iot systems security attacks using network forensics | |
Hajdarevic et al. | Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation | |
Kennedy et al. | Following the Wi-Fi breadcrumbs: Network based mobile application privacy threats | |
Aditya et al. | A Study of Common Vulnerabilities in IoT Devices | |
sri wahyuningsi Manguling et al. | Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks | |
Pratama et al. | Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta | |
Helling | Home network security | |
Wofford | Rogue Access Points: The Threat to Public Wireless Networks | |
Mwathi et al. | Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach | |
Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
Razak et al. | A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems |