Mostrar el registro sencillo del ítem

dc.contributor.authorUseche Pelaez, David
dc.contributor.authorDiaz Lopez, Daniel
dc.contributor.authorNespoli, Pantaleone
dc.contributor.authorGomez Marmol, Felix
dc.date.accessioned2021-11-04T16:43:20Z
dc.date.available2021-11-04T16:43:20Z
dc.date.issued2018
dc.identifier.urihttps://repositorio.escuelaing.edu.co/handle/001/1798
dc.description.abstractThe Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.eng
dc.description.abstractEl Internet de las cosas (IoT) se considera una tecnología emergente con potencialidades considerables. Su paradigma de todo conectado entre sí invadió el mundo real, con objetos inteligentes ubicados en varios aparatos cotidianos capaces de comunicarse de forma autónoma a través de infraestructuras de red ya existentes. Como contrapartida, el gran avance que ha supuesto el IoT en nuestra vida trae consigo al mismo tiempo graves problemas de seguridad, ya que el flujo de información entre los objetos queda mayoritariamente desprotegido frente a atacantes malintencionados. El artículo que nos ocupa propone TRIS, un novedoso centinela para proteger los entornos inteligentes de las ciberamenazas. Nuestro centinela protege los dispositivos IoT mediante tres anillos de defensa, lo que da como resultado una protección más precisa. Además, analizamos la implementación real del centinela utilizando herramientas de código abierto. Se llevan a cabo experimentos exhaustivos en el centinela, lo que demuestra que el centinela desplegado funciona meticulosamente incluso en condiciones de mucho estrés, lo que demuestra la aplicabilidad de TRIS en un escenario distribuido y dinámico como IoT.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherIEEE Xplorespa
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/spa
dc.titleTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threatseng
dc.typeDocumento de Conferenciaspa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
oaire.accessrightshttp://purl.org/coar/access_right/c_14cbspa
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.contributor.researchgroupInformáticaspa
dc.publisher.placeSpainspa
dc.relation.conferencedate15-18 Oct. 2018spa
dc.relation.conferenceplaceValencia, Spainspa
dc.relation.indexedN/Aspa
dc.relation.ispartofconference2018 Fifth International Conference on Internet of Things: Systems, Management and Securityspa
dc.relation.referencesPantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.spa
dc.relation.referencesGartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.spa
dc.relation.referencesSrisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.spa
dc.relation.referencesYong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.spa
dc.relation.referencesMarkus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.spa
dc.relation.referencesHuansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.spa
dc.relation.referencesAlessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.spa
dc.relation.referencesHuansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.spa
dc.relation.referencesShin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.spa
dc.relation.referencesJonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.spa
dc.relation.referencesYin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.spa
dc.relation.referencesAl-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.spa
dc.relation.referencesJesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.spa
dc.relation.referencesLatifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.spa
dc.relation.referencesCiampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.spa
dc.relation.referencesKen. Dunham et al., Android Malware and Analysis, CRC Press, 2014.spa
dc.relation.referencesJoshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.spa
dc.relation.referencesOnur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.spa
dc.relation.referencesMadhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.spa
dc.relation.referencesBoštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.spa
dc.relation.referencesDaniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.spa
dc.rights.accessrightsinfo:eu-repo/semantics/closedAccessspa
dc.rights.creativecommonsAtribución 4.0 Internacional (CC BY 4.0)spa
dc.subject.armarcInternet
dc.subject.armarcInternet of Things
dc.subject.armarcArquitectura de computadoresspa
dc.subject.armarcInternet de las Cosasspa
dc.subject.armarcAprendizaje automáticospa
dc.subject.armarcSeguridad de sistemas informáticosspa
dc.subject.proposalSecurityeng
dc.subject.proposalMonitoringeng
dc.subject.proposalServerseng
dc.subject.proposalMalwareeng
dc.subject.proposalComputer architectureeng
dc.type.coarhttp://purl.org/coar/resource_type/c_18cpspa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/conferenceObjectspa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTspa


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

https://creativecommons.org/licenses/by/4.0/
Excepto si se señala otra cosa, la licencia del ítem se describe como https://creativecommons.org/licenses/by/4.0/