2020
DOI: 10.1109/access.2020.3005643
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms

Abstract: The Internet of Things (IoT) exemplifies a large network of sensing and actuating devices that have penetrated into the physical world enabling new applications like smart homes, intelligent transportation, smart healthcare and smart cities. Through IoT, these applications have consolidated in the modern world to generate, share, aggregate and analyze large amount of security-critical and privacy sensitive data. As this consolidation gets stronger, the need for security in IoT increases. With first line of def… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 147 publications
(550 reference statements)
0
4
0
Order By: Relevance
“…In zero-day attack scenarios, even when firewalls or intrusion-detection systems are present, they are not effective in detecting malicious botnet activities due to the absence of signatures for attacks that are unknown [8]. Kamaldeep, et al [9], Zarpelo et al [10], and Wazzan et al [11] made similar observations that a signature-based approach is not effective against zero-day attacks.…”
Section: Introductionmentioning
confidence: 95%
“…In zero-day attack scenarios, even when firewalls or intrusion-detection systems are present, they are not effective in detecting malicious botnet activities due to the absence of signatures for attacks that are unknown [8]. Kamaldeep, et al [9], Zarpelo et al [10], and Wazzan et al [11] made similar observations that a signature-based approach is not effective against zero-day attacks.…”
Section: Introductionmentioning
confidence: 95%
“…A hybrid technique has been proposed to improve the capabilities of current intrusion detection and prevention systems by merging these two methods of misuse and anomaly. The fundamental notion is that while anomaly identifies unknown attacks, misuse detects known assaults [5,20,24,26,33] . The goal of anomaly detection is to identify unusual patterns of behavior.…”
Section: Related Research Workmentioning
confidence: 99%
“…The authors also discussed the availability of IDS datasets and the challenges faced by IoT-based IDSs. In addition to IDSs, Dutta et al [18] have also discussed Intrusion Prevention Systems (IPS) and Intrusion Response Systems (IRS). The authors included works that depend on security in the IoT standardized protocol stack by considering nine different dimensions and characteristics.…”
Section: Related Workmentioning
confidence: 99%