Movatterモバイル変換


[0]ホーム

URL:


Kumar et al., 2017 - Google Patents

Review on security and privacy concerns in Internet of Things

Kumar et al., 2017

ViewPDF
Document ID
2002644054872083271
Author
Kumar N
Madhuri J
ChanneGowda M
Publication year
Publication venue
2017 International Conference on IoT and Application (ICIOT)

External Links

Snippet

Internet of Things (IoT) is associate degree rising conception which can interconnect billions of devices (such as smartphones, sensors and alternative networking devices), to speak with one another. IoT may be a system wherever objects embedded with detector technology to …
Continue reading atwww.researchgate.net (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

PublicationPublication DateTitle
Shafiq et al.The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Kumar et al.Review on security and privacy concerns in Internet of Things
Hintaw et al.MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT)
Mallick et al.Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Kumar et al.EDIMA: Early detection of IoT malware network activity using machine learning techniques
Habibi et al.Heimdall: Mitigating the internet of insecure things
Cheema et al.[Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review
Sinha et al.Information Security threats and attacks with conceivable counteraction
Islam et al.An analysis of cybersecurity attacks against internet of things and security solutions
Humayun et al.Industry 4.0 and cyber security issues and challenges
Damghani et al.Classification of attacks on IoT
GhadeerCybersecurity issues in internet of things and countermeasures
Arukonda et al.The innocent perpetrators: reflectors and reflection attacks
Nasser et al.Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Bdair et al.Brief of intrusion detection systems in detecting ICMPv6 attacks
Dua et al.Iisr: A secure router for iot networks
Gupta et al.Security challenges in adopting internet of things for smart network
Khalid et al.Study of security and privacy issues in internet of things
Zaman et al.Towards SDN and blockchain based IoT countermeasures: a survey
Patel et al.Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Mudgerikar et al.Iot attacks and malware
Simkhada et al.Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Rani et al.Classification of security issues and cyber attacks in layered internet of things
da Rocha et al.A Study on APT in IoT Networks.
Yousef et al.Four-layer Architecture for IoT Security in Fog Network

[8]
ページ先頭

©2009-2025 Movatter.jp