A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM
2018
Wireless Communications and Mobile Computing
An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is affected under ...
The paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. ...
against an IoT attack. ...
doi:10.1155/2018/3029638
fatcat:pc4ywho5fnbhbkpxua2bhfhaci
BlockSIEM: Protecting Smart City Services through a Blockchain-based and Distributed SIEM
2020
Sensors
Such security events are generated by IoT sentinels that are in charge of shielding groups of IoT devices. ...
The paper at hand proposes BlockSIEM, a blockchain-based and distributed Security Information and Event Management (SIEM) solution framework for the protection of the aforementioned smart city services ...
IoT Sentinels An IoT sentinel (S i ∈ S = {S 1 , . . . , S n S }) is in charge of protecting a set of IoT devices (D m ⊂ D) in its proximity against cyber attacks. ...
doi:10.3390/s20164636
pmid:32824695
fatcat:cm4dbrqzbndcfa3cgvvc6wokdm
Security, Privacy, and Trust on Internet of Things
2019
Wireless Communications and Mobile Computing
Finally, they sincerely hope the reader will share their view and find this special issue very useful.
Constantinos Kolias Weizhi Meng Georgios Kambourakis Jiageng Chen ...
While in "Shielding IoT against cyber-attacks: An eventbased approach using SIEM" by D. D. ...
Unlike most approaches that verify such security schemes primarily against Chosen Ciphertext Attacks, this paper proposes verification against Repayable Chosen Ciphertext Attacks. ...
doi:10.1155/2019/6452157
fatcat:3xgkmdggfrggjh4uwt65r336y4
COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
2019
Sensors
Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. ...
The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. ...
Research Opening 2018, by the project "Strengthening Governance Capacity for Smart Sustainable Cities" (Grant No. 2018-3538/001-001) sponsored by the Erasmus+ programme and by VirusTotal, who provided us ...
doi:10.3390/s19071492
fatcat:oiofzyi3zrclhkjimueqyf6k2i
Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME)
2021
Future Internet
However, when using Cisco, the price reflected the buy-in into this expertise and Cisco's mainframe network, to give up-to-date information on cyber-attacks. ...
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. ...
Security Incidents and Events Management Systems (SIEMs) SMEs use various different software to manage their Security Information and Event Management Systems (SIEM). ...
doi:10.3390/fi13080186
fatcat:jyggowbzurcdrezu5jhr3g5okm
Ecossian Brochure
[article]
2017
Zenodo
The ECOSSIAN brochure provides an overview of the ECOSSIAN concept, its major benefits and the approach taken. The technical framework is described and the key components are illustrated. ...
Also the use cases and demonstration scenarios are described. ...
Based on an infrastructure interdependency model, the ECOSSIAN system should be able to warn dependent CIs about effects caused by cyber attacks on the CIs they are dependent from. ...
doi:10.5281/zenodo.800586
fatcat:gvxbnityevfqpp45grydublvpy
Information Security Management Practices: Expectations and Reality
[chapter]
2017
Advances in Cybersecurity 2017
Future research will focus on using multimodal biometrics, more precisely, face images and body images, and fusing the results in order to achieve better performance of the classifier. ...
consists of four steps; (1) preparation for a cyber-attack, (2) detection of a cyber-attack or an intruder in the system, (3) response to a cyber-attack and (4) analysis of the incident or event. ...
One of the problem lies with the inefficiency of signature based approaches to detect cyber attacks. ...
doi:10.18690/978-961-286-114-8.1
dblp:conf/cecc/PrislanLB17
fatcat:r4fyha6kdnd6zehhtbxtjqctey
Evolution of 5G Cyber Threats and Security Solutions
[article]
2022
Zenodo
Accordingly, it addresses the challenges and tendencies in state-of-the-art security solutions and exemplifies the use of these solutions to daily and understandable threats. ...
Cyber-attacks also occur at this level. ...
of Machine Learning techniques; and the automation of the use of CTI to stop or prevent cyber-attacks that requires optimized exchange of information between different security enablers deployed in the ...
doi:10.5281/zenodo.6457557
fatcat:vjhfl3avpjdi7p6p7v54fho7gu
A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions
2020
IEEE Access
This paper reviews the background and related studies in the areas of cloud systems, intrusion detection and blockchain applications against cyber attacks. ...
This paper presents an overview of cloud architecture and categorises potential state-of-the-art security events based on their occurrence at different cloud deployment models. ...
The APT is a form of cyber attack [64] in which an intruder gains unauthorised access to computing infrastructure and remains undetected for an extended period of time. ...
doi:10.1109/access.2020.2999715
fatcat:qz677wrupvcblbvcrm74owmjyu
D1.1: HEIR innovations for healthcare systems
2021
Zenodo
Moreover, it performs a literature review (academic and technical) focusing on all relevant technologies and defines HEIR innovations against existing solutions. ...
Vulnerable medical devices Recent events have shown the impact of cyber-attacks on infrastructures that we do not expect to fail. ...
All connected devices forming the Internet of Medical Things (IoMT) are extremely sensitive to cyber-attacks. ...
doi:10.5281/zenodo.5749855
fatcat:bazdcvuxtzdtphqp4k5yu6hap4
Comparative Research of Cybersecurity Information Sharing Models
2019
Information & Security An International Journal
An essential factor in information exchange is the place of registration of organizations or companies. ...
Summary of findings: unclear allocation of responsibilities in national government departments prevents authorities from fighting together against cyber and physical threats. ...
cyber-attacks. ...
doi:10.11610/isij.4315
fatcat:bjvebj5ov5clfpvuubyrdwdcq4
Machine Learning in Application Security
[chapter]
2017
Advances in Security in Computing and Communications
When we talk about humans, the first thing that comes to an attacker's mind is applications. ...
Traditional signature-based techniques are inadequate for rising attacks and threats that are evolving in the application layer. ...
Machine learning and security information and event management (SIEM) solution Security information and event management (SIEM) solutions have started leveraging machine learning into its latest versions ...
doi:10.5772/intechopen.68796
fatcat:gn5zjbwq7vfxje4x3smesdeclm
A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0
2021
IEEE Access
This paper introduces step-by-step the concepts and practical aspects of an Industry 4.0 manufacturing factory that are related to cybersecurity. ...
Industry 4.0 is a revolution in manufacturing by introducing disruptive technologies such as Internet of Things (IoT) and cloud-computing into the heart of the factory. ...
logs in real-time using SIEM (Security Information and Event Management) solutions; • Periodic review of the logs, the access privileges and the configurations; • Monitor availability of IoT devices in ...
doi:10.1109/access.2021.3056650
fatcat:pfls2n3gjbeifpk5l2dxnnxsla
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
Moreover, the existing SDN based communication systems have considered only the impact of cyber-attacks. ...
However, this proposal did not address many known cyber-attacks and the physical threats. ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review
[article]
2018
arXiv
pre-print
Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies. ...
Method: We used Systematic Literature Review (SLR) method for reviewing 74 primary studies selected using well-defined criteria. ...
The generated results are evaluated against a predicate threshold through a trigger and if the results exceed a specific limit, then an alert is generated that signal towards a possible cyber attack. ...
arXiv:1802.03178v1
fatcat:m6yigyrqrvcpdhg7qxncdh3lsi
« Previous
Showing results 1 — 15 out of 27 results