A framework for mitigating zero-day attacks in IoT

作者: Ilsun You , Vishal Sharma , Kyungroul Lee , Kangbin Yim , Jiyoon Kim

DOI:

关键词: VulnerabilityComputer scienceComputer securityNetwork securityData sharingInternet of ThingsExploitZero-day attackService providerGraph (abstract data type)

摘要: Internet of Things (IoT) aims at providing connectivity between every computing entity. However, this facilitation is also leading to more cyber threats which may exploit the presence a vulnerability period time. One such zero-day threat that lead attacks are detrimental an enterprise as well network security. In article, study presented on for IoT networks and context graph-based framework provide strategy mitigating these attacks. The proposed approach uses distributed diagnosis system classifying central service provider local user site. Once potential attack identified, critical data sharing protocol used transmit alert messages reestablish trust entities devices. results show capable efficiently with 33% 21% improvements in terms cost operation communication overheads, respectively, comparison centralized system.

参考文章(8)
Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Sybil Attacks and Their Defenses in the Internet of Things IEEE Internet of Things Journal. ,vol. 1, pp. 372- 383 ,(2014) , 10.1109/JIOT.2014.2344013
Ratinder Kaur, Maninder Singh, A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 1520- 1549 ,(2014) , 10.1109/SURV.2014.022714.00160
Leyla Bilge, Tudor Dumitras, Before we knew it Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 833- 844 ,(2012) , 10.1145/2382196.2382284
Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner, Security and privacy challenges in industrial internet of things design automation conference. ,vol. 17, pp. 54- ,(2015) , 10.1145/2744769.2747942
Rush Carskadden, Michael J. Covington, Threat implications of the Internet of Things international conference on cyber conflict. pp. 1- 12 ,(2013)
Georgios Portokalidis, Asia Slowinska, Herbert Bos, Argos Proceedings of the 2006 EuroSys conference on - EuroSys '06. ,vol. 40, pp. 15- 27 ,(2006) , 10.1145/1217935.1217938
Brightstarlang Wanswett, Hemanta Kumar Kalita, The Threat of Obfuscated Zero Day Polymorphic Malwares: An Analysis international conference on computational intelligence and communication networks. pp. 1188- 1193 ,(2015) , 10.1109/CICN.2015.230
Vishal Sharma, Jae Deok Lim, Jeong Nyeo Kim, Ilsun You, SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers Mobile Information Systems. ,vol. 2017, pp. 1- 17 ,(2017) , 10.1155/2017/3273917