Modeling and Design of Secure Internet of Things 2020
DOI: 10.1002/9781119593386.ch10
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet of Things

Abstract: As a solution to protect and defend a system against inside attacks, many intrusion detection systems (IDSs) have been developed to identify and react to them for protecting a system. However, the core idea of an IDS is a reactive mechanism in nature even though it detects intrusions which have already been in the system. Hence, the reactive mechanisms would be way behind and not effective for the actions taken by agile and smart attackers. Due to the inherent limitation of an IDS with the reactive nature, int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…The assessment mainly relies on the involvement of failure modes and recovery strategies for availability evaluation while attack intensities along with recovery of attack damage are the main focus being taken into account for security-aware assessment. Further considerations on security attack methods, security risks, and the effectiveness of different security countermeasures (for instance, Moving Target Defense (MTD) [68,69]) are of our future works. In addition, another extension can be the consideration of both performance and availability assessment (which is roughly called, perform-ability).…”
Section: Further Discussionmentioning
confidence: 99%
“…The assessment mainly relies on the involvement of failure modes and recovery strategies for availability evaluation while attack intensities along with recovery of attack damage are the main focus being taken into account for security-aware assessment. Further considerations on security attack methods, security risks, and the effectiveness of different security countermeasures (for instance, Moving Target Defense (MTD) [68,69]) are of our future works. In addition, another extension can be the consideration of both performance and availability assessment (which is roughly called, perform-ability).…”
Section: Further Discussionmentioning
confidence: 99%
“…Recently, Ge et al [54] discussed a GA-based approach for optimizing the network shuffling in an SDN-based IoT network. In this work, the authors considered two types of the IoT nodes (e.g., decoy and real nodes), and designed three metrics, including the number of attack paths towards the decoy targets, mean time to security failure, and defense cost.…”
Section: B Genetic Algorithm-based Mtdmentioning
confidence: 99%
“…In addition to having sufficient knowledge of malware, exploits and network protocols, they need to be able to navigate the vast quantities of data, including logs, metadata, and packet capture (PCAP) data. Proactive defence has received a research focus in recent years [2] [3].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, reactive mechanisms are far behind and are not be able to handle actions taken by clever adversaries. However, there is proactive defense that has been designed to detect potential attackers and/or mitigate the impact of intrusions ahead of their penetration like IPSs [3].…”
Section: Introductionmentioning
confidence: 99%