[go: up one dir, main page]

Kumar, 2020 - Google Patents

A principled approach to measuring the IoT ecosystem

Kumar, 2020

View PDF
Document ID
10616657734051111512
Author
Kumar D
Publication year

External Links

Snippet

Abstract Internet of Things (IoT) devices combine network connectivity, cheap hardware, and actuation to provide new ways to interface with the world. In spite of this growth, little work has been done to measure the network properties of IoT devices. Such measurements can …
Continue reading at www.ideals.illinois.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/02Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
    • H04L41/0246Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization exchanging or transporting network management information using Internet, e.g. aspects relating to embedding network management web servers in network elements, web service for network management purposes, aspects related to Internet applications or services or web-based protocols, simple object access protocol [SOAP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/08Monitoring based on specific metrics
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
Antonakakis et al. Understanding the mirai botnet
Kumar et al. All things considered: An analysis of {IoT} devices on home networks
US10812521B1 (en) Security monitoring system for internet of things (IOT) device environments
US9860265B2 (en) System and method for identifying exploitable weak points in a network
US9942270B2 (en) Database deception in directory services
US9609019B2 (en) System and method for directing malicous activity to a monitoring system
US8302198B2 (en) System and method for enabling remote registry service security audits
Victor et al. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
US10476891B2 (en) Monitoring access of network darkspace
Cui et al. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
US20170195349A1 (en) Platform for protecting small and medium enterprises from cyber security threats
Srinivasa et al. Open for hire: attack trends and misconfiguration pitfalls of IoT devices
WO2016081561A1 (en) System and method for directing malicious activity to a monitoring system
CN114402567A (en) Online detection of algorithmically generated domains
US20160344750A1 (en) Apparatus and Method for Characterizing the Risk of a User Contracting Malicious Software
US20250240313A1 (en) Large language model (llm) powered detection reasoning solution
US20240333759A1 (en) Inline ransomware detection via server message block (smb) traffic
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
US20190104141A1 (en) System and Method for Providing and Facilitating an Information Security Marketplace
Kumar A principled approach to measuring the IoT ecosystem
Munteanu et al. Catch-22: Uncovering Compromised Hosts using SSH Public Keys
Mannan et al. Privacy report card for parental control solutions
Frank Jr Mirai bot scanner summation prototype
Karamanos Investigation of home router security
US12355792B2 (en) Strategically aged domain detection