Hamad et al., 2019 - Google Patents
Iot device identification via network-flow based fingerprinting and learningHamad et al., 2019
- Document ID
- 5767555080329944059
- Author
- Hamad S
- Zhang W
- Sheng Q
- Nepal S
- Publication year
- Publication venue
- 2019 18th IEEE international conference on trust, security and privacy in computing and communications/13th IEEE international conference on big data science and engineering (TrustCom/BigDataSE)
External Links
Snippet
Nowadays, increasing number of intelligent devices and smart sensors are connected by Internet of Things (IoT) techniques, and have helped people to manage and improve their lives. However, security issues are emerging in IoT, among which things identification is one …
- 238000000034 method 0 abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamad et al. | Iot device identification via network-flow based fingerprinting and learning | |
US11848950B2 (en) | Method for protecting IoT devices from intrusions by performing statistical analysis | |
Meidan et al. | Detection of unauthorized IoT devices using machine learning techniques | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
US20180278636A1 (en) | System and method for malware detection learning | |
Fernando et al. | Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI) | |
Fallah et al. | Android malware detection using network traffic based on sequential deep learning models | |
Kornyo et al. | Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms | |
Salunkhe et al. | Security enrichment in intrusion detection system using classifier ensemble | |
Kamel et al. | Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model | |
GB2616346A (en) | A system and method for autonomously fingerprinting and enumerating Internet of Thing (IoT) devices based on nated IPFIX and DNS traffic | |
Le et al. | Unsupervised monitoring of network and service behaviour using self organizing maps | |
Aluthge | Iot device fingerprinting with sequence-based features | |
Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
Alshammari et al. | Scalable and robust intrusion detection system to secure the IoT environments using software defined networks (SDN) enabled architecture | |
Yusufovna | Integrating intrusion detection system and data mining | |
Murthy et al. | A lightweight Intrusion Detection for Internet of Things‐based smart buildings | |
Brahma et al. | Device identification using network traces in a smart home IoT network | |
McLaren et al. | Mining malware command and control traces | |
Matke et al. | An empirical evaluation of machine learning algorithms for intrusion detection in iiot networks | |
Shriyal et al. | IoT device classification techniques and traffic analysis-A review | |
Babu et al. | A Hybrid Intrusion Detection System against Botnet Attack in IoT Using Light Weight Signature and Ensemble Learning Technique | |
Kurmi et al. | Device identification in iot networks using network trace fingerprinting | |
Prasad et al. | Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis. | |
Gutiérrez Portela et al. | Enhancing intrusion detection in IoT communications through ML model generalization with a new dataset (IDSAI) |