Jayakrishnan et al., 2019 - Google Patents
Attack Patterns on IoT devices using Honey Net CloudJayakrishnan et al., 2019
View PDF- Document ID
- 508920032759192058
- Author
- Jayakrishnan A
- Vasanthi V
- Publication year
External Links
Snippet
Due to the superfluous growth of IoT devices in the current digital world, where lots of devices are becoming smart by being able to connect internet with many smart features, IoT devices have become the main target of cyber-attacks for the hackers these days. Since the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10567431B2 (en) | Emulating shellcode attacks | |
| US9609019B2 (en) | System and method for directing malicous activity to a monitoring system | |
| US9942270B2 (en) | Database deception in directory services | |
| US9356950B2 (en) | Evaluating URLS for malicious content | |
| Tushir et al. | The impact of dos attacks onresource-constrained iot devices: A study on the mirai attack | |
| CN104468632A (en) | Loophole attack prevention method, device and system | |
| WO2016081561A1 (en) | System and method for directing malicious activity to a monitoring system | |
| Musca et al. | Detecting and analyzing zero-day attacks using honeypots | |
| Martin et al. | Raspberry Pi Malware: An analysis of cyberattacks towards IoT devices | |
| Tabari et al. | What are attackers after on iot devices? an approach based on a multi-phased multi-faceted iot honeypot ecosystem and data clustering | |
| Bansal et al. | Analysis and Detection of various DDoS attacks on Internet of Things Network | |
| Chen et al. | A proactive approach to intrusion detection and malware collection | |
| Jayakrishnan et al. | Attack Patterns on IoT devices using Honey Net Cloud | |
| Yin et al. | Empirical study of system resources abused by iot attackers | |
| Colombini et al. | Cyber threats monitoring: Experimental analysis of malware behavior in cyberspace | |
| Rodrigues et al. | Design and implementation of a low-cost low interaction IDS/IPS system using virtual honeypot approach | |
| Zhai et al. | Research on applications of honeypot in Campus Network security | |
| Mohammed et al. | 3 Using Routers and Honeypots in Combination for Collecting | |
| Cusack et al. | Listening to botnet communication channels to protect information systems | |
| Famera et al. | Analyzing The Mirai IoT Botnet and Its Recent Variants: Satori, Mukashi, Moobot, and Sonic | |
| Ayala | How hackers gain access to a healthcare facility or hospital network | |
| Lim et al. | Malware attacks intelligence in higher education networks | |
| Ansona et al. | INTEGRATED HONEYPOT | |
| Brzeczko | Scalable Framework for Turn-key Honeynet Deployment | |
| Vârlan et al. | A practical analysis of virtual honeypot mechanisms |