Si et al., 2021 - Google Patents
EmuIoTNet: An Emulated IoT Network for Dynamic AnalysisSi et al., 2021
- Document ID
- 5614087882562193944
- Author
- Si Q
- Cui L
- Li L
- Ding Z
- Liu Y
- Hao Z
- Publication year
- Publication venue
- International Conference on Information and Communications Security
External Links
Snippet
Dynamic analysis of IoT firmware is an effective method to discover security flaws and vulnerabilities. However, limited by emulation methods concentrating on a single IoT device, it is challenging to find security issues hidden in communication channels. This paper …
- 238000004458 analytical method 0 title abstract description 57
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/14—Network-specific arrangements or communication protocols supporting networked applications for session management
- H04L67/141—Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/08—Transmission control procedure, e.g. data link level control procedure
- H04L29/08081—Protocols for network applications
- H04L29/08576—Arrangements for session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20250112820A1 (en) | Managing network connected devices | |
| US11184224B2 (en) | System, method and compute program product for accessing a device on a network | |
| US11080399B2 (en) | System and method for vetting mobile phone software applications | |
| Hakim et al. | U-pot: A honeypot framework for upnp-based iot devices | |
| US10637724B2 (en) | Managing network connected devices | |
| US9712486B2 (en) | Techniques for the deployment and management of network connected devices | |
| Chadha et al. | Cybervan: A cyber security virtual assured network testbed | |
| US8875296B2 (en) | Methods and systems for providing a framework to test the security of computing system over a network | |
| Dover | A denial of service attack against the Open Floodlight SDN controller | |
| Wang et al. | Discovering vulnerabilities in COTS IoT devices through blackbox fuzzing web management interface | |
| Fan et al. | Versatile virtual honeynet management framework | |
| US9483287B2 (en) | Communication infrastructure for virtual machines | |
| JP2022506847A (en) | Automatic keyboard mapping for virtual desktops | |
| Wang et al. | Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain | |
| Darki et al. | Rare: A systematic augmented router emulation for malware analysis | |
| Tunc et al. | CLaaS: Cybersecurity Lab as a Service. | |
| Si et al. | EmuIoTNet: An Emulated IoT Network for Dynamic Analysis | |
| Tunc et al. | CLaaS: Cybersecurity Lab as a Service--design, analysis, and evaluation | |
| Fan et al. | Dynamic hybrid honeypot system based transparent traffic redirection mechanism | |
| Kumar Jain et al. | IoT security: a survey of issues, attacks and defences | |
| Kumar et al. | IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements | |
| Bugeja et al. | On the analysis of semantic denial-of-service attacks affecting smart living devices | |
| Abdullah | Evaluation of Attack Tools against 5G Open RAN Simulation Environments | |
| Morfonios | Kubernetes cybersecurity | |
| Liu | Leveraging Android OS to Secure Diverse Devices in Residential Networks |