Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots
暂无分享,去创建一个
Yuval Elovici | Asaf Shabtai | Nils Ole Tippenhauer | Yan Lin Aung | Martín Ochoa | Ragav Sridharan | Amit Tambe | A. Shabtai | Y. Elovici | Martín Ochoa | Y. Aung | Ragav Sridharan | Amit Tambe
[1] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[2] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[3] Roksana Boreli,et al. Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[4] Towards a definition of the Internet of Things ( IoT ) , 2015 .
[5] Thommen George Karimpanal,et al. Identification and off-policy learning of multiple objectives using adaptive clustering , 2017, Neurocomputing.
[6] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[7] Roksana Boreli,et al. Smart-Phones Attacking Smart-Homes , 2016, WISEC.
[8] Tongbo Luo,et al. IoTCandyJar : Towards an Intelligent-Interaction Honeypot for IoT Devices , 2017 .
[9] Tsutomu Matsumoto,et al. IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..
[10] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[11] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[12] Yuval Elovici,et al. SIPHON: Towards Scalable High-Interaction Physical Honeypots , 2017, CPSS@AsiaCCS.
[13] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[14] Salvatore J. Stolfo,et al. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan , 2010, ACSAC '10.
[15] Hsinchun Chen,et al. Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.
[16] Roksana Boreli,et al. An experimental study of security and privacy risks with emerging household appliances , 2014, 2014 IEEE Conference on Communications and Network Security.
[17] Daniel Jeswin Nallathambi,et al. Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).