308 Hits in 6.4 sec

Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things [article]

Xuyang Ding, Feng Xiao, Man Zhou
2020 arXiv   pre-print
The DDoS attack is a serious threat to the Internet of Things (IoT).  ...  As a new class of DDoS attacks, Link-flooding attack (LFA) disrupts connectivity between legitimate IoT devices and target servers by flooding only a small number of links.  ...  Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things Xuyang Ding, Feng Xiao, and Man Zhou Abstract-The DDoS attack is a serious threat to Internet of Things (IoT).  ... 
arXiv:1703.09521v5 fatcat:nrbmh6xahbhrfgja6wweezgroa

Privacy in the Internet of Things: threats and challenges

Jan Henrik Ziegeldorf, Oscar Garcia Morchon, Klaus Wehrle
2013 Security and Communication Networks  
Smart things allow indeed for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already now limiting the success of the Internet of Things  ...  To this end, we first discuss the evolving features and trends in the Internet of Things with the goal of scrutinizing their privacy implications.  ...  to thwart active inventory attacks through querying.  ... 
doi:10.1002/sec.795 fatcat:iqqa5dncufchhhtosguiuc6h2u

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)

Bjorn De Sutter, Christian Collberg, Mila Dalla Preda, Michael Wagner
2019 Dagstuhl Reports  
The seminar is situated in the domain of software protection against so-called man-at-the-end attacks, in which attackers have white-box access to the software that embeds valuable assets with security  ...  evaluations; 3) how to build decision support to aid users of protection tool with the selection of appropriate protections.  ...  Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products.  ... 
doi:10.4230/dagrep.9.8.1 dblp:journals/dagstuhl-reports/SutterCPW19 fatcat:guwem6swfjf3hm4qaqcfkc6phi

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning.  ...  ., Internet, mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents origin.  ...  [54] proposed a mechanism for CCN to detect attack patterns based on the activities of the FIB, PIT, and CS.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

Emerging Threats and Vulnerabilities: Reality and Rhetoric [chapter]

Malcolm W. Harkins
2016 Managing Risk and Information Security  
Government agencies and businesses have suffered real attacks attributed to nation-state actors: in 2014, for example, the US Government charged five members of the Chinese military with stealing information  ...  More data is online and vulnerable to attack, and millions of new Internetconnected devices are inevitably introducing new risks. Malware production has matured into a sizable industry.  ...  The Web Expands to the Internet of Things The Web continues to present a huge attack surface.  ... 
doi:10.1007/978-1-4842-1455-8_6 fatcat:mkon5oddwvfx3no47b6uqvzozy

Crowdsensing and privacy in smart city applications [article]

Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R.K. Shyamasundar, Surya Nepal
2018 arXiv   pre-print
Smartness in smart cities is achieved by sensing phenomena of interest and using them to make smart decisions.  ...  However, involving people brings of the risk of exposing their private information.This chapter explores crowdsensing in smart city applications and its privacy implications.  ...  specially established for detecting events such as mudslide, flood, storm, fire, volcanic or seismic activities.  ... 
arXiv:1806.07534v1 fatcat:2xzudp4qybdmxccseeviabnsf4

Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences [article]

Joseph Gardiner, Marco Cova, Shishir Nagaraja
2015 arXiv   pre-print
We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels.  ...  We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence  ...  the activation of responses to attacks.  ... 
arXiv:1408.1136v2 fatcat:dhhjzhq44rgqxojwfaw324ehh4

Modelling cyber security for software-defined networks those grow strong when exposed to threats

Usama Ahmed, Imran Raza, Syed Asad Hussain, Amjad Ali, Muddesar Iqbal, Xinheng Wang
2015 Journal of Reliable Intelligent Environments  
Whether the information is being processed in the application, in transit within the network or residing in the storage, it is equally susceptible to attack at every level of abstraction and cannot be  ...  with SDN" and "Security for SDN" to achieve the overall objective of protecting our information from cyber threats in this globally connected internetwork.  ...  Volume-based attacks such as UDP floods, ICMP floods, and other spoofed-packet floods that can target the network links in SDN. 2.  ... 
doi:10.1007/s40860-015-0008-0 fatcat:5uzcjwxp4bhnfbq3acw6srtmny

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey [article]

Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
2021 arXiv   pre-print
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources.  ...  It closes with an outline of some research directions to tackle major gaps in current defensive deception research.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.  ... 
arXiv:2101.10121v2 fatcat:ko2mzzvyerehnfxbwgeuz72ilu

Blockchain for Future Wireless Networks: A Decade Survey

Tejal Rathod, Nilesh Kumar Jadav, Mohammad Dahman Alshehri, Sudeep Tanwar, Ravi Sharma, Raluca-Andreea Felseghi, Maria Simona Raboaca
2022 Sensors  
Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN.  ...  The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart  ...  The development of the internet-of-things (IoT) technology enables portability and more openness to the wireless network.  ... 
doi:10.3390/s22114182 pmid:35684802 pmcid:PMC9185230 fatcat:gg5tavt2ubbw5gksic7qgczakq

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
THE INTERNET OF THINGS Internet-connected things are multiplying rapidly.  ...  Timeline of Butterfly Attacks Against Industry Sectors T The Butterfly group has been active for a number of years, targeting a variety of organizations, including those linked to extracting natural resources  ...  T Browser protection for avoiding obfuscated web-based attacks.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

Fundamental Challenges Toward Making the IoT a Reachable Reality

Yuankun Xue, Ji Li, Shahin Nazarian, Paul Bogdan
2017 ACM Transactions on Design Automation of Electronic Systems  
addressable and interacting seamlessly to form a giant networked system of systems known as the Internet-of-Things (IoT).  ...  Constantly advancing integration capability is paving the way for the construction of the extremely large scale continuum of the Internet where entities or things from vastly varied domains are uniquely  ...  of Things (IOT).  ... 
doi:10.1145/3001934 fatcat:fsuh4gobvne5talv5rvhwabn5y

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Ansam Khraisat, Ammar Alazab
2021 Cybersecurity  
AbstractThe Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems.  ...  Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes.  ...  Acknowledgments The research is supported by the Internet Commerce Security Laboratory, Federation University Australia. The authors are grateful to the Centre for.  ... 
doi:10.1186/s42400-021-00077-7 fatcat:32nrdpgvkjg4ljjxc44rewc55y

Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes

Marco Prandini, Marco Ramilli
2012 Future Internet  
Malicious attackers, in fact, could quite easily exploit the vulnerabilities in these systems to hijack the process and lead to wrong decisions, also causing the public to lose trust in the systems themselves  ...  In the recent past, the so-called "Web 2.0" became a powerful tool for decision making processes.  ...  The decision process failed, and missed the goal of indicating a way to satisfy the man's need for food. Could this failure be the outcome of a malicious attempt at thwarting the process?  ... 
doi:10.3390/fi4030700 fatcat:4hfm5ap36rfyjiw2lnbadj2flq

Taming the 800 Pound Gorilla

Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, Manish Karir
2014 Proceedings of the 2014 Conference on Internet Measurement Conference - IMC '14  
This dataset also allows us, for the first time, to analyze global DDoS attack victims (including ports attacked) and incidents, where we show 437K unique IPs targeted with at least 3 trillion packets,  ...  We chronicle how this attack rapidly rose from obscurity to become the dominant large DDoS vector. Via the lens of five distinct datasets, we characterize the advent and evolution of these attacks.  ...  We would like to thank Jared Mauch for sharing the dataset as well as Kirk Soluk and team at Arbor Networks for sharing traffic and attack statistics.  ... 
doi:10.1145/2663716.2663717 dblp:conf/imc/CzyzKGPBK14 fatcat:bvrwpyciqjcgzpmesy3fvndblm
« Previous Showing results 1 — 15 out of 308 results