2020 9th Mediterranean Conference on Embedded Computing (MECO) 2020
DOI: 10.1109/meco49872.2020.9134200
|View full text |Cite
|
Sign up to set email alerts
|

Exploration of Impactful Countermeasures on IoT Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…The third class includes approaches where the selection of mitigation actions is based on the optimization of the value a single KPI or transforming the problem to a single objective (SO) problem e.g. (Chehida et al, 2020) where the authors select countermeasures based on minimizing the cost to deploy them.…”
Section: Attack and Threat Mitigation In Iot Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…The third class includes approaches where the selection of mitigation actions is based on the optimization of the value a single KPI or transforming the problem to a single objective (SO) problem e.g. (Chehida et al, 2020) where the authors select countermeasures based on minimizing the cost to deploy them.…”
Section: Attack and Threat Mitigation In Iot Networkmentioning
confidence: 99%
“…In the context of IoT networks specifically, KPI optimization for mitigation action selection has become a recent topic of interest. Three solutions involving SO approaches for mitigation selection have been identified, either in generic IoT networks (Chehida et al, 2020;Garzia et al, 2017) or smart energy grid systems (Zonouz and Haghani, 2013). Two IoT specific studies using MO have been identified i.e.…”
Section: Multi-objective Optimization In the Context Of Iot Network A...mentioning
confidence: 99%
See 2 more Smart Citations
“…Such an example is presented in [30]: based on predefined scenarios and values, the system chooses sets of predefined responses. The third group includes approaches where the selection of mitigation actions is based on the optimization of the value of a single KPI or transforming the problem to a single objective problem, e.g., [31], where the authors select attack responses based on minimizing the cost of deploying them. Finally, the fourth class includes the approaches where the selection of mitigation actions is based on the optimization of the values of multiple KPIs which might be antagonistic to each other but better describe the impact of the action on the system.…”
Section: Previous Work In the Mitigation Of Anomaliesmentioning
confidence: 99%