2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) 2020
DOI: 10.1109/sadfe51007.2020.00011
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting Edge and Cloud Services in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…One of the well-known attacks Man in The Middle (MiTM) is an attack common to the IoT devices as they are connected with the remote services on the cloud and can be compromised. To defend against this kind of attack the research proposes a Black Pi [135] a local agent that resides on the IoT device, that detects the malicious and mutated connections from the network using the history and the list from the blacklisted databases. However, it shows that using the MUD along with the BlackPi will be a better solution to secure the IoT devices from external attacks.…”
Section: ) Mud and Embedded Solutionsmentioning
confidence: 99%
“…One of the well-known attacks Man in The Middle (MiTM) is an attack common to the IoT devices as they are connected with the remote services on the cloud and can be compromised. To defend against this kind of attack the research proposes a Black Pi [135] a local agent that resides on the IoT device, that detects the malicious and mutated connections from the network using the history and the list from the blacklisted databases. However, it shows that using the MUD along with the BlackPi will be a better solution to secure the IoT devices from external attacks.…”
Section: ) Mud and Embedded Solutionsmentioning
confidence: 99%