27 Hits in 7.1 sec

Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM

Daniel Díaz López, María Blanco Uribe, Claudia Santiago Cely, Andrés Vega Torres, Nicolás Moreno Guataquira, Stefany Morón Castro, Pantaleone Nespoli, Félix Gómez Mármol
2018 Wireless Communications and Mobile Computing  
An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is affected under  ...  The paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities.  ...  against an IoT attack.  ... 
doi:10.1155/2018/3029638 fatcat:pc4ywho5fnbhbkpxua2bhfhaci

BlockSIEM: Protecting Smart City Services through a Blockchain-based and Distributed SIEM

Juan Velandia Botello, Andrés Pardo Mesa, Fabián Ardila Rodríguez, Daniel Díaz-López, Pantaleone Nespoli, Félix Gómez Mármol
2020 Sensors  
Such security events are generated by IoT sentinels that are in charge of shielding groups of IoT devices.  ...  The paper at hand proposes BlockSIEM, a blockchain-based and distributed Security Information and Event Management (SIEM) solution framework for the protection of the aforementioned smart city services  ...  IoT Sentinels An IoT sentinel (S i ∈ S = {S 1 , . . . , S n S }) is in charge of protecting a set of IoT devices (D m ⊂ D) in its proximity against cyber attacks.  ... 
doi:10.3390/s20164636 pmid:32824695 fatcat:cm4dbrqzbndcfa3cgvvc6wokdm

Security, Privacy, and Trust on Internet of Things

Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen
2019 Wireless Communications and Mobile Computing  
Finally, they sincerely hope the reader will share their view and find this special issue very useful. Constantinos Kolias Weizhi Meng Georgios Kambourakis Jiageng Chen  ...  While in "Shielding IoT against cyber-attacks: An eventbased approach using SIEM" by D. D.  ...  Unlike most approaches that verify such security schemes primarily against Chosen Ciphertext Attacks, this paper proposes verification against Repayable Chosen Ciphertext Attacks.  ... 
doi:10.1155/2019/6452157 fatcat:3xgkmdggfrggjh4uwt65r336y4

COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things

Pantaleone Nespoli, David Useche Pelaez, Daniel Díaz López, Félix Gómez Mármol
2019 Sensors  
Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection.  ...  The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability.  ...  Research Opening 2018, by the project "Strengthening Governance Capacity for Smart Sustainable Cities" (Grant No. 2018-3538/001-001) sponsored by the Erasmus+ programme and by VirusTotal, who provided us  ... 
doi:10.3390/s19071492 fatcat:oiofzyi3zrclhkjimueqyf6k2i

Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME)

Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash, Chaminda Hewage
2021 Future Internet  
However, when using Cisco, the price reflected the buy-in into this expertise and Cisco's mainframe network, to give up-to-date information on cyber-attacks.  ...  Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data.  ...  Security Incidents and Events Management Systems (SIEMs) SMEs use various different software to manage their Security Information and Event Management Systems (SIEM).  ... 
doi:10.3390/fi13080186 fatcat:jyggowbzurcdrezu5jhr3g5okm

Ecossian Brochure [article]

ECOSSIAN Consortium
2017 Zenodo  
The ECOSSIAN brochure provides an overview of the ECOSSIAN concept, its major benefits and the approach taken. The technical framework is described and the key components are illustrated.  ...  Also the use cases and demonstration scenarios are described.  ...  Based on an infrastructure interdependency model, the ECOSSIAN system should be able to warn dependent CIs about effects caused by cyber attacks on the CIs they are dependent from.  ... 
doi:10.5281/zenodo.800586 fatcat:gvxbnityevfqpp45grydublvpy

Information Security Management Practices: Expectations and Reality [chapter]

Kaja Prislan, Branko Lobnikar, Igor Bernik
2017 Advances in Cybersecurity 2017  
Future research will focus on using multimodal biometrics, more precisely, face images and body images, and fusing the results in order to achieve better performance of the classifier.  ...  consists of four steps; (1) preparation for a cyber-attack, (2) detection of a cyber-attack or an intruder in the system, (3) response to a cyber-attack and (4) analysis of the incident or event.  ...  One of the problem lies with the inefficiency of signature based approaches to detect cyber attacks.  ... 
doi:10.18690/978-961-286-114-8.1 dblp:conf/cecc/PrislanLB17 fatcat:r4fyha6kdnd6zehhtbxtjqctey

Evolution of 5G Cyber Threats and Security Solutions [article]

Rodrigo Asensio, Edgardo Montes de Oca, Huu Nghia Nguyen, Vinh Hoa La, Manh Dung Nguyen, Pol Alemany, Ricard Vilalta, Raul Muñoz, Wissem Soussi, Gürkan Gür, Tarik Taleb, Vincent Lefebvre (+9 others)
2022 Zenodo  
Accordingly, it addresses the challenges and tendencies in state-of-the-art security solutions and exemplifies the use of these solutions to daily and understandable threats.  ...  Cyber-attacks also occur at this level.  ...  of Machine Learning techniques; and the automation of the use of CTI to stop or prevent cyber-attacks that requires optimized exchange of information between different security enablers deployed in the  ... 
doi:10.5281/zenodo.6457557 fatcat:vjhfl3avpjdi7p6p7v54fho7gu

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks.  ...  This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models.  ...  The APT is a form of cyber attack [64] in which an intruder gains unauthorised access to computing infrastructure and remains undetected for an extended period of time.  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

D1.1: HEIR innovations for healthcare systems

Apostolis Zarras
2021 Zenodo  
Moreover, it performs a literature review (academic and technical) focusing on all relevant technologies and defines HEIR innovations against existing solutions.  ...  Vulnerable medical devices Recent events have shown the impact of cyber-attacks on infrastructures that we do not expect to fail.  ...  All connected devices forming the Internet of Medical Things (IoMT) are extremely sensitive to cyber-attacks.  ... 
doi:10.5281/zenodo.5749855 fatcat:bazdcvuxtzdtphqp4k5yu6hap4

Comparative Research of Cybersecurity Information Sharing Models

Jussi Simola
2019 Information & Security An International Journal  
An essential factor in information exchange is the place of registration of organizations or companies.  ...  Summary of findings: unclear allocation of responsibilities in national government departments prevents authorities from fighting together against cyber and physical threats.  ...  cyber-attacks.  ... 
doi:10.11610/isij.4315 fatcat:bjvebj5ov5clfpvuubyrdwdcq4

Machine Learning in Application Security [chapter]

Nilaykumar Kiran Sangani, Haroot Zarger
2017 Advances in Security in Computing and Communications  
When we talk about humans, the first thing that comes to an attacker's mind is applications.  ...  Traditional signature-based techniques are inadequate for rising attacks and threats that are evolving in the application layer.  ...  Machine learning and security information and event management (SIEM) solution Security information and event management (SIEM) solutions have started leveraging machine learning into its latest versions  ... 
doi:10.5772/intechopen.68796 fatcat:gn5zjbwq7vfxje4x3smesdeclm

A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0

Valentin Mullet, Patrick Sondi, Eric Ramat
2021 IEEE Access  
This paper introduces step-by-step the concepts and practical aspects of an Industry 4.0 manufacturing factory that are related to cybersecurity.  ...  Industry 4.0 is a revolution in manufacturing by introducing disruptive technologies such as Internet of Things (IoT) and cloud-computing into the heart of the factory.  ...  logs in real-time using SIEM (Security Information and Event Management) solutions; • Periodic review of the logs, the access privileges and the configurations; • Monitor availability of IoT devices in  ... 
doi:10.1109/access.2021.3056650 fatcat:pfls2n3gjbeifpk5l2dxnnxsla

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Moreover, the existing SDN based communication systems have considered only the impact of cyber-attacks.  ...  However, this proposal did not address many known cyber-attacks and the physical threats.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review [article]

Faheem Ullah, M. Ali Babar
2018 arXiv   pre-print
Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies.  ...  Method: We used Systematic Literature Review (SLR) method for reviewing 74 primary studies selected using well-defined criteria.  ...  The generated results are evaluated against a predicate threshold through a trigger and if the results exceed a specific limit, then an alert is generated that signal towards a possible cyber attack.  ... 
arXiv:1802.03178v1 fatcat:m6yigyrqrvcpdhg7qxncdh3lsi
« Previous Showing results 1 — 15 out of 27 results