Bekri et al., 2022 - Google Patents
Intelligent IoT Systems: security issues, attacks, and countermeasuresBekri et al., 2022
View PDF- Document ID
- 18095431634239604016
- Author
- Bekri W
- Layeb T
- Rihab J
- Fourati L
- Publication year
- Publication venue
- 2022 International Wireless Communications and Mobile Computing (IWCMC)
External Links
Snippet
The Internet of things (IoT) growth has created a large spectrum of heterogeneous devices where these devices produce a considerable amount of data every second. The produced data could be sensitive and even critical. Hence, one of the biggest IoT concerns is to …
- 238000011156 evaluation 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Waheed et al. | Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures | |
Al-Naji et al. | A survey on continuous authentication methods in Internet of Things environment | |
Andrea et al. | Internet of Things: Security vulnerabilities and challenges | |
Almaiah | A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology | |
Siwakoti et al. | Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures | |
Albalawi et al. | Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment | |
Humayun | Industry 4.0 and cyber security issues and challenges | |
Haque et al. | A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things | |
Zahra et al. | Fuzzy logic and fog based secure architecture for internet of things (flfsiot) | |
Rath et al. | Network security: attacks and control in MANET | |
Mohindru et al. | Security attacks in internet of things: A review | |
Bekri et al. | Intelligent IoT Systems: security issues, attacks, and countermeasures | |
Jabraeil Jamali et al. | IoT security | |
Andrade et al. | Cybersecurity, sustainability, and resilience capabilities of a smart city | |
Srinadh et al. | An analytical study on security and future research of Internet of Things | |
Maheswaran et al. | A critical review on intrusion detection systems in IoT based on ML approach: A Survey | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Farhadi et al. | A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures | |
Alfaqih et al. | Internet of things security based on devices architecture | |
Laeeq et al. | A study of security issues, vulnerabilities and challenges in internet of things | |
Hasan et al. | Towards a threat model and privacy analysis for V2P in 5G networks | |
Valadares et al. | Security challenges and recommendations in 5G-IoT scenarios | |
Salas-Fernández et al. | Metaheuristic techniques in attack and defense strategies for cybersecurity: a systematic review | |
Hromada et al. | Security aspects of the internet of things | |
Said et al. | Internet of Things (IoT): A Study of Security Issues and Challenges. |