2021
DOI: 10.1016/j.jisa.2021.102878
|View full text |Cite
|
Sign up to set email alerts
|

Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…On the downside, such a change also implies the existence of ill-motivated entities that constantly try to attack connected systems to damage the confidentiality, integrity, or availability of the provided online services. Such threat entities use increasingly advanced techniques, for example, based on malware campaigns [45] or threats addressed to a specific technology [46].…”
Section: Discussionmentioning
confidence: 99%
“…On the downside, such a change also implies the existence of ill-motivated entities that constantly try to attack connected systems to damage the confidentiality, integrity, or availability of the provided online services. Such threat entities use increasingly advanced techniques, for example, based on malware campaigns [45] or threats addressed to a specific technology [46].…”
Section: Discussionmentioning
confidence: 99%
“…To defend smart devices in IoT environments Classifying different denial-of-service attacks in cloud computing An automating network security analysis at packet-level A rule-based engine for security alert correlation A belief rule-based anomaly detection Nespoli et al 101 Khorshed et al 102 Holkovivc et al 103 Kenaza et al 104 Ul et al 106 Fuzzy Logic-based Approach…”
Section: Rule-based Modeling and Decision-makingmentioning
confidence: 99%
“…Another rule with many security features may be "IF flag value is SF, service is ftb, and duration <= 4, THEN the outcome is anomaly," which could be created using the tree shown in Figure 7. 32 Nespoli et al 102 provide a dynamic rule-based system for cyberprotection in IoT contexts. Using rule-based learning, Khorshed et al 103 propose a method for classifying various denial-of-service threats in cloud computing.…”
Section: Rule-based Modeling and Decision-makingmentioning
confidence: 99%
“…Other areas of research in Edge AI for IoT include integrating image compression algorithms in IoT data from agriculture and agricultural industries, modeling collaborative and distributed heterogeneous operating systems, and deploying AI on devices in a smart home context [63,87,88]. There is also an interest in performing experiments on real fish farms, improving classification accuracies and deploying the model on ESP32 while integrating connectivity media such as LoRaWan and SIM Card Router [47].…”
Section: Edge Ai For Increasing Autonomy Of Iot Systemsmentioning
confidence: 99%