Logo do repositório
 
Publicação

Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach

dc.contributor.authorVieira, Leandro
dc.contributor.authorSantos, Leonel
dc.contributor.authorGoncalves, Ramiro
dc.contributor.authorRabadão, Carlos
dc.date.accessioned2026-01-22T17:06:12Z
dc.date.available2026-01-22T17:06:12Z
dc.date.issued2019-06
dc.description.abstractAt the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.eng
dc.identifier.citationL. Vieira, L. Santos, R. Gonçalves and C. Rabadão, "Identifying Attack Signatures for the Internet of Things: An IP Flow Based Approach," 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, 2019, pp. 1-7, doi: 10.23919/CISTI.2019.8760650.
dc.identifier.doi10.23919/cisti.2019.8760650
dc.identifier.isbn978-1-7281-1552-8
dc.identifier.issn2166-0727
dc.identifier.urihttp://hdl.handle.net/10400.8/15460
dc.language.isoeng
dc.peerreviewedyes
dc.publisherIEEE
dc.relation.hasversionhttps://ieeexplore.ieee.org/document/8760650/
dc.relation.ispartof2019 14th Iberian Conference on Information Systems and Technologies (CISTI)
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectSecurity
dc.subjectnetwork attacks
dc.subjectflow monitoring
dc.subjectnetwork intrusion detection
dc.subjectInternet of Things
dc.titleIdentifying Attack Signatures for the Internet of Things: An IP Flow Based Approacheng
dc.typeconference paper
dspace.entity.typePublication
oaire.citation.conferenceDate2019-07
oaire.citation.conferencePlaceCoimbra, Portugal
oaire.citation.title2019 14th Iberian Conference on Information Systems and Technologies (CISTI)
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.familyNameRabadão
person.givenNameCarlos
person.identifier.ciencia-id2C1C-E900-6A57
person.identifier.orcid0000-0001-7332-4397
person.identifier.ridM-3235-2013
person.identifier.scopus-author-id22433497800
relation.isAuthorOfPublication99f438ca-9099-4e7e-91ea-1a5cbab7a1ab
relation.isAuthorOfPublication.latestForDiscovery99f438ca-9099-4e7e-91ea-1a5cbab7a1ab

Ficheiros

Principais
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
193.pdf
Tamanho:
2.69 MB
Formato:
Adobe Portable Document Format