Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security 2018
DOI: 10.5220/0006708502370243
|View full text |Cite
|
Sign up to set email alerts
|

System Protection Agent Against Unauthorized Activities via USB Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Acknowledgments: The authors would like to thank Miguel Frade for his contribution with the initial version of this work in [10].…”
Section: Data Availability Statement: Not Applicablementioning
confidence: 99%
See 2 more Smart Citations
“…Acknowledgments: The authors would like to thank Miguel Frade for his contribution with the initial version of this work in [10].…”
Section: Data Availability Statement: Not Applicablementioning
confidence: 99%
“…Additional efforts have been made to allow USB devices to be mounted only after a user verification. Previous work in [10] proposed a system protection agent that blocks USB devices' installation and enables users to check and mount each device after being informed about its category. However, this proposal had the following limitations: (1) the filtering process is based on a short and less accurate vendor-defined Identifier (ID) and (2) the devices are presented to the user without any prior or distributed threat assessment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Upon guessing the authentication key, the attacker gains access to the target device and initiates the DoS attack. Figure 18 shows the DoS attack when an infected USB dongle is employed for upgrading an infected kernel inside of the machine [83]. Such an attack may employ multiple attacking nodes, which together form a botnet.…”
Section: Pilot Implementation and Testingmentioning
confidence: 99%
“…Factor l corresponds to the percentage of the standard deviation used to determine the threshold for pruning. 94 83. 94.14 93.97 93.97 93.80 93.97 93.45 91.91 90.01 87.60 93.97 93.45 93.28 91.56 84.16 82.09 58.86 65.95 69.53 55.93 94.83 94.83 94.32 93.11 92.95 87.77 74.69 56.45 51.80 43.02 95.69 95.69 95.69 95.52 95.18 95.18 95.00 93.97 85.71 75.21 95.70 95.87 95.87 95.87 95.53 95.01 94.50 88.83 90.20 79.89 Evaluation of the performance for the developed architectures with the method of pruning scalar weights with retraining.…”
mentioning
confidence: 99%