Combining MUD Policies with SDN for IoT Intrusion Detection
暂无分享,去创建一个
Vijay Sivaraman | Hassan Habibi Gharakheili | Ayyoob Hamza | V. Sivaraman | Ayyoob Hamza | H. Gharakheili
[1] Matthew Roughan,et al. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report) , 2018, ArXiv.
[2] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[3] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[4] Nan Zhang,et al. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps , 2017, WISEC.
[5] Vijay Sivaraman,et al. Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] Roksana Boreli,et al. Smart-Phones Attacking Smart-Homes , 2016, WISEC.
[7] Guangjie Han,et al. Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[8] Vijay Sivaraman,et al. Quantifying the reflective DDoS attack capability of household IoT devices , 2017, WISEC.
[9] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Matthew Roughan,et al. Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles , 2018, IoT S&P@SIGCOMM.
[11] Vijay Sivaraman,et al. Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.