Percorrer por autor "Vieira, Leandro"
A mostrar 1 - 4 de 4
Resultados por página
Opções de ordenação
- CoAP Flow Signatures for the Internet of ThingsPublication . Canuto, Luis; Santos, Leonel; Vieira, Leandro; Goncalves, Ramiro; Rabadão, CarlosThe development of technology brought an exponential evolution of IoT networks, and with a number of different devices connected to the Internet, meaning, more IP addresses, traffic and devices susceptible to attacks. These types of networks are characterized by their interoperability and low resources, making it a complex ecosystem and making it difficult to implement management and monitoring measures, leading to a lack of security. Considering the impact that IoT networks have on the market, their protection is essential and, is now one of the themes in constant evolution. With the focus on security, this work aims to characterize a CoAP and CoAPS signatures, through the analysis of a flow in a test scenario and recognize the types of messages of the signature and what is their impact on the network and later creating rules that could help an IDS, in order to save resources and time. When analyzing the flows, it was concluded that it is possible to identify some characteristics of a signature, such as identifying Confirmable and Non-Confirmable messages.
- CROSS-PLATFORM DEVELOPMENT FOR E-COMMERCEPublication . Vieira, Leandro; Bernardino, Anabela; Bernardino, EugéniaElectronic commerce is generally seen as a competitor for physical stores, however, this paper proposes a solution where they work side-by-side to improve the in-store customer experience. An application directed for store retailers was created with the cross-platform framework React Native, making it available for Android, iOS, and the web. Using thebe of their interest, and place orders, providing the customer with a unique and faster shopping experience.
- Identifying Attack Signatures for the Internet of Things: An IP Flow Based ApproachPublication . Vieira, Leandro; Santos, Leonel; Goncalves, Ramiro; Rabadão, CarlosAt the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.
- MQTT Flow Signatures for the Internet of ThingsPublication . Leal, Roberto; Santos, Leonel; Vieira, Leandro; Gonçalves, Ramiro; Rabadão, CarlosThe number of IoT devices and the volume of network traffic has grown continuously during the past years. IoT devices are smart devices designed with simple functions in mind, like collecting the temperature or opening a door. However, IoT devices lack a good security layer due to lack of resources: small memory, processor and/or battery. Consequently, new potential attacks and security problems have arisen. In order to detect and mitigate these security problems Intrusion Detection Systems (IDS) can be used, However, abnormal traffic must be distinguished from normal IoT patterns. In this article, a study was done on characterization of traffic signatures of two typical IoT application protocols - MQTT and MQTTS - with the objective of generating and collecting IP flows of said traffic. An IoT application scenario was simulated and using the traffic collected, an analysis of MQTT and MQTTS flows were elaborated to identify flow-based signatures that could be used to identify the network traffic of IoT application protocols.
