Spelling suggestions: "subject:"1nternet off chings security"" "subject:"1nternet off bushings security""
1 |
A Network Telescope Approach for Inferring and Characterizing IoT ExploitationsUnknown Date (has links)
While the seamless interconnection of IoT devices with the physical realm
is envisioned to bring a plethora of critical improvements on many aspects and in
diverse domains, it will undoubtedly pave the way for attackers that will target and
exploit such devices, threatening the integrity of their data and the reliability of
critical infrastructure. The aim of this thesis is to generate cyber threat intelligence
related to Internet-scale inference and evaluation of malicious activities generated by
compromised IoT devices to facilitate prompt detection, mitigation and prevention of
IoT exploitation.
In this context, we initially provide a unique taxonomy, which sheds the light
on IoT vulnerabilities from five di↵erent perspectives. Subsequently, we address the
task of inference and characterization of IoT maliciousness by leveraging active and
passive measurements. To support large-scale empirical data analytics in the context
of IoT, we made available corresponding raw data through an authenticated platform. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
|
2 |
Microservices-based approach for Healthcare CybersecurityUnknown Date (has links)
Healthcare organizations, realizing the potential of the Internet of Things (IoT)
technology, are rapidly adopting the technology to bring signi cant improvements in
the quality and e ectiveness of the service. However, these smart and interconnected
devices can act as a potential \back door" into a hospital's IT network, giving attack-
ers access to sensitive information. As a result, cyber-attacks on medical IoT devices
have been increasing since the last few years. It is a growing concern for all the
stakeholders involved, as the impact of such attacks is not just monetary or privacy
loss, but the lives of many patients are also at risk. Considering the various kinds of
IoT devices one may nd connected to a hospital's network, traditional host-centric
security solutions (e.g. antivirus, software patches) are at odds with realistic IoT
infrastructure (e.g. constrained hardware, lack of proper built-in security measures).
There is a need for security solutions which consider the challenges of IoT devices like
heterogeneity of technology and protocols used, limited resources in terms of battery
and computation power, etc. Accordingly, the goals of this thesis have been: (1) to
provide an in-depth understanding of vulnerabilities of medical IoT devices; (2) to in-
troduce a novel approach which uses a microservices-based framework as an adaptive and agile security solution to address the issue. The thesis focuses on OS Fingerprint-
ing attacks because of its signi cance for attackers to understand a target's network.
In this thesis, we developed three microservices, each one designed to serve a speci c
functionality. Each of these microservices has a small footprint with RAM usage of
approximately 50 MB. We also suggest how microservices can be used in a real-life
scenario as a software-based security solution to secure a hospital's network consisting
of di erent IoT devices. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
|
3 |
Blockchain-Based Security Framework for the Internet of Things and Home NetworksDiego Miguel Mendez Mena (10711719) 27 April 2021 (has links)
During recent years, attacks on Internet of Things (IoT) devices have grown significantly. Cyber criminals have been using compromised IoT machines to attack others, which include critical internet infrastructure systems. Latest attacks increase the urgency for the information security research community to develop new strategies and tools to safeguard vulnerable devices at any level. Millions of intelligent things are now part of home-based networks that are usually disregarded by solutions platforms, but not by malicious entities.<br>Therefore, the following document presents a comprehensive framework that aims to secure home-based networks, but also corporate and service provider ones. The proposed solution utilizes first-hand information from different actors from different levels to create a decentralized privacy-aware Cyber Threat Information (CTI) sharing network, capable of automate network responses by relying on the secure properties of the blockchain powered by the Ethereum algorithms.
|
4 |
Um Sistema de Detecção de Intrusão para Detecção de Ataques de Negação de Serviço na Internet das Coisas. / An Intrusion Detection System for Detection of Attacks Service Denial on the Internet of Things.SOUSA, Breno Fabrício Lira Melo 21 December 2016 (has links)
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-01T15:17:20Z
No. of bitstreams: 1
Breno Fabricio.pdf: 3022898 bytes, checksum: d3e376b3280034170ef737c756a8bb30 (MD5) / Made available in DSpace on 2017-08-01T15:17:20Z (GMT). No. of bitstreams: 1
Breno Fabricio.pdf: 3022898 bytes, checksum: d3e376b3280034170ef737c756a8bb30 (MD5)
Previous issue date: 2016-12-21 / The paradigm of the Internet of Things (in english, Internet of Things - IoT)
came to allow intercommunication between different objects via Internet, and thereby
facilitate the form of how the end user will interact with a wide variety of devices that
surround him in everyday life. The availability of features that these devices have is a
factor that deserves great attention because the use of such resources inappropriately
can cause serious damage. Therefore, since such devices are connected to the internet,
they are vulnerable to various threats, such as, denial-of-service attack (DoS). In order
to tackle DoS type threats in IoT, an Intrusion Detection System (IDS) is proposed for
IoT, aiming at detecting some types of DoS attacks. / O paradigma da Internet das Coisas (em inglês, Internet of Things - IoT)
surgiu para possibilitar a intercomunicação entre os diferentes objetos através da
Internet, e, com isso, facilitar a forma de como o usuário final interagirá com a grande
variedade de dispositivos que o cerca no dia a dia. A disponibilidade de recursos que
estes dispositivos possuem é um fator que merece uma grande atenção, pois o uso de
tais recursos de forma não apropriada pode gerar graves danos. Para tanto, uma vez
que tais dispositivos estão conectados à Internet, estes estão vulneráveis a diversas
ameaças, como, por exemplo, ataque de negação de serviço (DoS). A fim de enfrentar
ameaças do tipo DoS em IoT, propõe-se um IDS (Intrusion Detection System) para IoT,
objetivando a detecção de alguns ataques do tipo DoS.
|
5 |
An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effectMuthavhine, Khumbelo Difference 07 1900 (has links)
Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sensors are connecting to the Internet. These devices interact with each other through the network and provide a new experience to its users. In order to make full use of this ubiquitous paradigm, security on IoT is important. There are problems with privacy concerns regarding certain algorithms that are on IoT, particularly in the area that relates to their avalanche effect means that a small change in the plaintext or key should create a significant change in the ciphertext. The higher the significant change, the higher the security if that algorithm. If the avalanche effect of an algorithm is less than 50% then that algorithm is weak and can create security undesirability in any network. In this, case IoT.
In this study, we propose to do the following: (1) Search and select existing block cryptographic algorithms (maximum of ten) used for authentication and encryption from different devices used on IoT. (2) Analyse the avalanche effect of select cryptographic algorithms and determine if they give efficient authentication on IoT. (3) Improve their avalanche effect by designing a mathematical model that improves their robustness against attacks. This is done through the usage of the initial vector XORed with plaintext and final vector XORed with cipher tect. (4) Test the new mathematical model for any enhancement on the avalanche effect of each algorithm as stated in the preceding sentences. (5) Propose future work on how to enhance security on IoT.
Results show that when using the proposed method with variation of key, the avalanche effect significantly improved for seven out of ten algorithms. This means that we have managed to improve 70% of algorithms tested. Therefore indicating a substantial success rate for the proposed method as far as the avalanche effect is concerned. We propose that the seven algorithms be replaced by our improved versions in each of their implementation on IoT whenever the plaintext is varied. / Electrical and Mining Engineering / M. Tech. (Electrical Engineering)
|
6 |
Internet of Things and Cybersecurity in a Smart HomeKiran Vokkarne (17367391) 10 November 2023 (has links)
<p dir="ltr">With the ability to connect to networks and send and receive data, Internet of Things (IoT) devices involve associated security risks and threats, for a given environment. These threats are even more of a concern in a Smart Home network, where there is a lack of a dedicated security IT team, unlike a corporate environment. While efficient user interface(UI) and ease of use is at the front and center of IoT devices within Smart Home which enables its wider adoption, often security and privacy have been an afterthought and haven’t kept pace when needed. Therefore, a unsafe possibility exists where malicious actors could exploit vulnerable devices in a domestic home environment.</p><p dir="ltr">This thesis involves a detailed study of the cybersecurity for a Smart Home and also examines the various types of cyberthreats encountered, such as DDoS, Man-In-Middle, Ransomware, etc. that IoT devices face. Given, IoT devices are commonplace in most home automation scenarios, its crucially important to detect intrusions and unauthorized access. Privacy issues are also involved making this an even more pertinent topic. Towards this, various state of the art industry standard tools, such as Nmap, Nessus, Metasploit, etc. were used to gather data on a Smart Home environment to analyze their impacts to detect security vulnerabilities and risks to a Smart Home. Results from the research indicated various vulnerabilities, such as open ports, password vulnerabilities, SSL certificate anomalies and others that exist in many cases, and how precautions when taken in timely manner can help alleviate and bring down those risks.</p><p dir="ltr">Also, an IoT monitoring dashboard was developed based on open-source tools, which helps visualize threats and emphasize the importance of monitoring. The IoT dashboard showed how to raise alerts and alarms based on specific threat conditions or events. In addition, currently available cybersecurity regulations, standards, and guidelines were also examined that can help safeguard against threats to commonly used IoT devices in a Smart Home. It is hoped that the research carried out in this dissertation can help maintain safe and secure Smart Homes and provide direction for future work in the area of Smart Home Cybersecurity.</p>
|
Page generated in 0.1299 seconds