Kumar, 2020 - Google Patents
A principled approach to measuring the IoT ecosystemKumar, 2020
View PDF- Document ID
- 10616657734051111512
- Author
- Kumar D
- Publication year
External Links
Snippet
Abstract Internet of Things (IoT) devices combine network connectivity, cheap hardware, and actuation to provide new ways to interface with the world. In spite of this growth, little work has been done to measure the network properties of IoT devices. Such measurements can …
- 238000005259 measurement 0 abstract description 110
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/0246—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization exchanging or transporting network management information using Internet, e.g. aspects relating to embedding network management web servers in network elements, web service for network management purposes, aspects related to Internet applications or services or web-based protocols, simple object access protocol [SOAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Antonakakis et al. | Understanding the mirai botnet | |
Kumar et al. | All things considered: An analysis of {IoT} devices on home networks | |
US10812521B1 (en) | Security monitoring system for internet of things (IOT) device environments | |
US9860265B2 (en) | System and method for identifying exploitable weak points in a network | |
US9942270B2 (en) | Database deception in directory services | |
US9609019B2 (en) | System and method for directing malicous activity to a monitoring system | |
US8302198B2 (en) | System and method for enabling remote registry service security audits | |
Victor et al. | IoT malware: An attribute-based taxonomy, detection mechanisms and challenges | |
US10476891B2 (en) | Monitoring access of network darkspace | |
Cui et al. | A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan | |
US20170195349A1 (en) | Platform for protecting small and medium enterprises from cyber security threats | |
Srinivasa et al. | Open for hire: attack trends and misconfiguration pitfalls of IoT devices | |
WO2016081561A1 (en) | System and method for directing malicious activity to a monitoring system | |
CN114402567A (en) | Online detection of algorithmically generated domains | |
US20160344750A1 (en) | Apparatus and Method for Characterizing the Risk of a User Contracting Malicious Software | |
US20250240313A1 (en) | Large language model (llm) powered detection reasoning solution | |
US20240333759A1 (en) | Inline ransomware detection via server message block (smb) traffic | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
US20190104141A1 (en) | System and Method for Providing and Facilitating an Information Security Marketplace | |
Kumar | A principled approach to measuring the IoT ecosystem | |
Munteanu et al. | Catch-22: Uncovering Compromised Hosts using SSH Public Keys | |
Mannan et al. | Privacy report card for parental control solutions | |
Frank Jr | Mirai bot scanner summation prototype | |
Karamanos | Investigation of home router security | |
US12355792B2 (en) | Strategically aged domain detection |