[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bekri et al., 2022 - Google Patents

Intelligent IoT Systems: security issues, attacks, and countermeasures

Bekri et al., 2022

View PDF
Document ID
18095431634239604016
Author
Bekri W
Layeb T
Rihab J
Fourati L
Publication year
Publication venue
2022 International Wireless Communications and Mobile Computing (IWCMC)

External Links

Snippet

The Internet of things (IoT) growth has created a large spectrum of heterogeneous devices where these devices produce a considerable amount of data every second. The produced data could be sensitive and even critical. Hence, one of the biggest IoT concerns is to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection

Similar Documents

Publication Publication Date Title
Waheed et al. Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures
Al-Naji et al. A survey on continuous authentication methods in Internet of Things environment
Andrea et al. Internet of Things: Security vulnerabilities and challenges
Almaiah A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology
Siwakoti et al. Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures
Albalawi et al. Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment
Humayun Industry 4.0 and cyber security issues and challenges
Haque et al. A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things
Zahra et al. Fuzzy logic and fog based secure architecture for internet of things (flfsiot)
Rath et al. Network security: attacks and control in MANET
Mohindru et al. Security attacks in internet of things: A review
Bekri et al. Intelligent IoT Systems: security issues, attacks, and countermeasures
Jabraeil Jamali et al. IoT security
Andrade et al. Cybersecurity, sustainability, and resilience capabilities of a smart city
Srinadh et al. An analytical study on security and future research of Internet of Things
Maheswaran et al. A critical review on intrusion detection systems in IoT based on ML approach: A Survey
Mogadem et al. A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Farhadi et al. A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
Alfaqih et al. Internet of things security based on devices architecture
Laeeq et al. A study of security issues, vulnerabilities and challenges in internet of things
Hasan et al. Towards a threat model and privacy analysis for V2P in 5G networks
Valadares et al. Security challenges and recommendations in 5G-IoT scenarios
Salas-Fernández et al. Metaheuristic techniques in attack and defense strategies for cybersecurity: a systematic review
Hromada et al. Security aspects of the internet of things
Said et al. Internet of Things (IoT): A Study of Security Issues and Challenges.