2018 IEEE/ACM Symposium on Edge Computing (SEC) 2018
DOI: 10.1109/sec.2018.00051
|View full text |Cite
|
Sign up to set email alerts
|

Defending Internet of Things Against Malicious Domain Names using D-FENS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 12 publications
0
2
0
1
Order By: Relevance
“…The attacker has gotten around the firewall and communicates directly with network devices via the victim's browser [43]. IoT devices provide a vast landscape for rebinding DNS attacks by getting access to the individual networks because of the security mechanisms used [44]. Using social engineering to lure the prey via the website through the small ads for visiting it [45].…”
Section: ) Zero-day Vulnerabilitymentioning
confidence: 99%
“…The attacker has gotten around the firewall and communicates directly with network devices via the victim's browser [43]. IoT devices provide a vast landscape for rebinding DNS attacks by getting access to the individual networks because of the security mechanisms used [44]. Using social engineering to lure the prey via the website through the small ads for visiting it [45].…”
Section: ) Zero-day Vulnerabilitymentioning
confidence: 99%
“…In Spaulding and Mohaisen [42], the DNS filtering system and system for network extraction (FENS) was developed and used CNN and LSTM for real-time classification together with blacklists. This system allows the prediction of malicious domain names that have never before been reported.…”
Section: Domain Generating Algorithmmentioning
confidence: 99%
“…En (Spaulding & Mohaisen, 2018), se propone una solución que combate tanto a Phishing como a ataques de DNS tal como DDoS. Así, se propone un sistema llamado D-FENS el cual identifica nombres de dominio maliciosos en tiempo real.…”
Section: B úLtimas Técnicas De Detección De Ataques De Phishingunclassified