Filters








3,114 Hits in 8.0 sec

A Review of Insider Threat Detection Approaches with IoT Perspective

Aram Kim, Junhyoung Oh, Jinho Ryu, Kyungho Lee
2020 IEEE Access  
In this work, we provide a generalization of aspects of insider threats with IoT and analyze the surveyed literature based on both private and public sources.  ...  INDEX TERMS Insider threat detection, Internet-of-Things, dataset, survey. VOLUME 8, 2020 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  DISCUSSION AND CONCLUSION In this paper, we analyzed the insider threat detection literature with the perspective of the IoT environment.  ... 
doi:10.1109/access.2020.2990195 fatcat:uxydn6lk4vdi5mtqaotp35s3oq

Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things

Jason R.C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese
2015 2015 International Workshop on Secure Internet of Things (SIoT)  
In this position paper we approach security and privacy in IoT from a different perspective to existing research, by considering the impact that IoT may have on the growing problem of insider threat within  ...  Our specific aim is to explore the extent to which IoT may exacerbate the insider-threat challenge for organisations and overview the range of new and adapted attack vectors.  ...  THE CHALLENGE WITH IOT AND INSIDER THREATS Thus far in this article, we have engaged in a state-ofthe-art review of two key aspects that impact organisations today.  ... 
doi:10.1109/siot.2015.10 dblp:conf/siot/NurseEAGC15 fatcat:5koktwaejjg5xboxepcu4sgvrm

Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems

Remi Badonnel, Carol Fung, Qi Li, Sandra Scott-Hayward
2020 IEEE Transactions on Network and Service Management  
infrastructures: novel techniques for graph-based detection of botnets, performance evaluation of insider threat detection methods, characterization of malicious IoT activities based on network traffic  ...  [item 2) in the Appendix] introduce and evaluate a system based on machine learning for supporting user-centered insider threat detection.  ... 
doi:10.1109/tnsm.2020.2972769 fatcat:lftjjawjb5enhmf2ohmlsqu5ja

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

Bako Ali, Ali Awad
2018 Sensors  
The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.  ...  The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified  ...  Table 1 shows the threats identified as a result of studying the entire IoT-based smart home system in terms of the cyber and physical perspectives and according to different assets containers.  ... 
doi:10.3390/s18030817 pmid:29518023 pmcid:PMC5876893 fatcat:75yvixssqngj3h3zjzvj2ugqsa

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Junaid Arshad, Muhammad Ajmal Azad, Roohi Amad, Khaled Salah, Mamoun Alazab, Razi Iqbal
2020 Electronics  
Through extensive study of existing intrusion detection approaches, we have identified open challenges to achieve effective intrusion detection for IoT infrastructures.  ...  Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems.  ...  .; Methodology and writing-review, M.A.A., K.S. and R.I.; Supervision, M.A. All authors have read and agreed to the published version of the manuscript.  ... 
doi:10.3390/electronics9040629 fatcat:6yqxhlzpp5fzxb7ornwz3iy5aq

Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services

Remi Badonnel, Carol Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman
2021 IEEE Transactions on Network and Service Management  
She is a Lecturer (Assistant Professor) with the School of Electronics, Electrical Engineering and Computer Science, and a member of the Centre for Secure Information Technologies, QUB.  ...  He heads the Internet and Cloud Security Group with a group of graduate students working on different topics in security.  ...  In "Anomaly Detection for Insider Threats Using Unsupervised Ensembles," D. Le and N.  ... 
doi:10.1109/tnsm.2021.3079189 fatcat:bzciidpzyjgknkarhziwpe26cu

Cyber Vulnerabilities on Smart Healthcare, Review and Solutions

Seyedmostafa Safavi
2020 Figshare  
The intended outcome of this review paper is to analyze the problems which people might be facing related to security issues in their smart homes and initiate a discussion on how healthcare devices which  ...  By reviewing previous literature, this paper proposes blockchain as a method to improve security and privacy in smart homes and smart healthcare.  ...  We are very grateful to anonymous reviewers for their remarks, response, and ideas.  ... 
doi:10.6084/m9.figshare.12644942.v1 fatcat:xi6mjtnzbzc2zjrhff55yjswgq

Techniques and countermeasures for preventing insider threats

Rakan A. Alsowail, Taher Al-Shehari
2022 PeerJ Computer Science  
As a result, several studies exist in the literature aimed to develop techniques and tools to detect and prevent various types of insider threats.  ...  Additionally, the article compares and discusses significant theoretical and empirical factors that play a key role in the effectiveness of insider threat prevention approaches (e.g., datasets, feature  ...  The survey in Liu et al. (2018) focused on insider threat detection and prevention techniques from a data analytic perspective.  ... 
doi:10.7717/peerj-cs.938 pmid:35494800 pmcid:PMC9044369 fatcat:tlaww57iq5dbxpzmssjfoodjfy

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT [article]

Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie, Razi Iqbal, Mamoun Alazab
2018 arXiv   pre-print
Based on a rigorous analysis of the existing intrusion detection approaches, the paper also identifies open challenges for an effective and collaborative design of intrusion detection system for resource-constrained  ...  Intrusion detection is one of the distinguished protection mechanisms with notable recent efforts made to establish effective intrusion detection for IoT and IoV.  ...  The attack model comprises of threats across different dimensions of an IoT system aiming to aid improved classification. • An extensive review of efforts with respect to intrusion detection for IoT systems  ... 
arXiv:1812.09160v1 fatcat:j4qevn6gvfbhdgj5smyt4gis6u

Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm

Yi Huang, Shah Nazir, Xinqiang Ma, Shiming Kong, Youyuan Liu, Muhammad Ahmad
2021 Security and Communication Networks  
Proper security measures can prevent attackers from interrupting the security of IoT network inside the smart city for secure data traffic.  ...  The increase in the number of devices connected to the Internet of things (IoT) is nearly beyond imagination. These devices are communicating with each other and facilitating human life.  ...  Firstly, the study provides a detailed review of the various applications of IoT and their cyber vulnerabilities and then presents a detailed assessment of potential approaches for mitigating the issues  ... 
doi:10.1155/2021/1852466 fatcat:na43fpbgovcqnpv6s7zitlkr4m

VisTAS: blockchain-based visible and trusted remote authentication system

Ahmad Ali, Mansoor Ahmed, Abid Khan, Adeel Anjum, Muhammad Ilyas, Markus Helfert
2021 PeerJ Computer Science  
The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats.  ...  The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation.  ...  Opportunities Detection of insider threat is possible only if legitimate data of authentication schemes are available.  ... 
doi:10.7717/peerj-cs.516 pmid:34084926 pmcid:PMC8157081 fatcat:v6ecchlvprfulm5dmad6a7bbxu

Machine Learning and Deep Learning Techniques for IoT-based Intrusion Detection Systems: A Literature Review

Laiby Thomas, Subramanya Bhat
2021 International journal of management, technology, and social science  
in this review of literature.  ...  Methodology: The papers in this study were published between 2014 and 2021 and dealt with the use of IDS in IoT security.  ...  A literature review has been undertaken to understand IDSs in detail and how Machine Learning can be integrated with IDS. The role of Machine Learning in IoT security is also investigated.  ... 
doi:10.47992/ijmts.2581.6012.0172 fatcat:mgmxejrejnatvckrc4lqpoi5hm

Machine Learning and Deep Learning Techniques for IoT-based Intrusion Detection Systems: A Literature Review

Laiby Thomas, Subrahmanya Bhat
2022 Zenodo  
in this review of literature.  ...  Methodology: The papers in this study were published between 2014 and 2021 and dealt with the use of IDS in IoT security.  ...  A literature review has been undertaken to understand IDSs in detail and how Machine Learning can be integrated with IDS. The role of Machine Learning in IoT security is also investigated.  ... 
doi:10.5281/zenodo.5814702 fatcat:fwnf7acalvew5hnloyu6cxhodm

DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE

Marcin Paprzycki, Maria Ganzha, Katarzyna Wasielewska, Piotr Lewandowski
2021 Journal of Computer Science and Cybernetics  
of DevOps methodology for Next Generation IoT deployments.  ...  Moreover, novelty of the proposed approach lies in leveraging DevSecOps in different stages and layers of the architecture.  ...  It is also able to detect the use of versions of libraries with security issues, and security threats related with the source code (e.g., with the taint checking).  ... 
doi:10.15625/1813-9663/37/3/16245 fatcat:jyhfo26vfnawrc5xcvs7eexz6a

Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management

In Lee
2020 Future Internet  
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT).  ...  This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework.  ...  Quantitative Approaches to Cybersecurity Risk Management This section reviews a few studies that focus on quantitative approaches to cybersecurity risk management.  ... 
doi:10.3390/fi12090157 doaj:3f79389138e540feac458278b4cc4d3e fatcat:y4jcjxsn35cpbilnx6w2mlufs4
« Previous Showing results 1 — 15 out of 3,114 results