The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 2017
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2017.122
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Real Time Framework for Monitoring IoT Devices for Attack Detection: Vision Paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…IoT application device performs required action according to the given instructions by portable devices and mobiles. A real time online monitoring system with its architecture is presented in [60], where attacks on devices can be detected and mitigated by authorities…”
Section: Application/action Layer Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…IoT application device performs required action according to the given instructions by portable devices and mobiles. A real time online monitoring system with its architecture is presented in [60], where attacks on devices can be detected and mitigated by authorities…”
Section: Application/action Layer Architecturementioning
confidence: 99%
“…IoT application device performs required action according to the given instructions by portable devices and mobiles. A real time online monitoring system with its architecture is presented in [60], where attacks on devices can be detected and mitigated by authorities. A survey on application layer protocol including Constrained Application Protocol (CoAp), Message Queue Telemetry Transport (MQTT), Extensible Messaging and Presence Protocol (XMPP) Services, Representational State Transfer (RESTFUL) and Advanced Message Queuing Protocol (AMQP) is presented in [61].…”
Section: Architecture Of Iot Aided Systemsmentioning
confidence: 99%
“…This architecture may be used by IoT vendors, third-party organizations (nonprofit organizations may seek to improve Internet security) and end users (organizations with a large number of IoTs). Some of the objectives of such a framework are to be able to quickly detect threats based on the analysis of IoT's abnormalities and to associate the IoT's information with other data to enhance the detection process [18].…”
Section: Background 1 Enhancements -New Technologies -Evolutionmentioning
confidence: 99%
“…A real‐time framework has been designed [9 ] for online attack detection in IoT devices. The framework consists of devices, data collection gateways, event brokers, dash board [6 ] and so on.…”
Section: Related Workmentioning
confidence: 99%