[go: up one dir, main page]

Si et al., 2021 - Google Patents

EmuIoTNet: An Emulated IoT Network for Dynamic Analysis

Si et al., 2021

Document ID
5614087882562193944
Author
Si Q
Cui L
Li L
Ding Z
Liu Y
Hao Z
Publication year
Publication venue
International Conference on Information and Communications Security

External Links

Snippet

Dynamic analysis of IoT firmware is an effective method to discover security flaws and vulnerabilities. However, limited by emulation methods concentrating on a single IoT device, it is challenging to find security issues hidden in communication channels. This paper …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/14Network-specific arrangements or communication protocols supporting networked applications for session management
    • H04L67/141Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • H04L29/08Transmission control procedure, e.g. data link level control procedure
    • H04L29/08081Protocols for network applications
    • H04L29/08576Arrangements for session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US20250112820A1 (en) Managing network connected devices
US11184224B2 (en) System, method and compute program product for accessing a device on a network
US11080399B2 (en) System and method for vetting mobile phone software applications
Hakim et al. U-pot: A honeypot framework for upnp-based iot devices
US10637724B2 (en) Managing network connected devices
US9712486B2 (en) Techniques for the deployment and management of network connected devices
Chadha et al. Cybervan: A cyber security virtual assured network testbed
US8875296B2 (en) Methods and systems for providing a framework to test the security of computing system over a network
Dover A denial of service attack against the Open Floodlight SDN controller
Wang et al. Discovering vulnerabilities in COTS IoT devices through blackbox fuzzing web management interface
Fan et al. Versatile virtual honeynet management framework
US9483287B2 (en) Communication infrastructure for virtual machines
JP2022506847A (en) Automatic keyboard mapping for virtual desktops
Wang et al. Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain
Darki et al. Rare: A systematic augmented router emulation for malware analysis
Tunc et al. CLaaS: Cybersecurity Lab as a Service.
Si et al. EmuIoTNet: An Emulated IoT Network for Dynamic Analysis
Tunc et al. CLaaS: Cybersecurity Lab as a Service--design, analysis, and evaluation
Fan et al. Dynamic hybrid honeypot system based transparent traffic redirection mechanism
Kumar Jain et al. IoT security: a survey of issues, attacks and defences
Kumar et al. IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
Bugeja et al. On the analysis of semantic denial-of-service attacks affecting smart living devices
Abdullah Evaluation of Attack Tools against 5G Open RAN Simulation Environments
Morfonios Kubernetes cybersecurity
Liu Leveraging Android OS to Secure Diverse Devices in Residential Networks