IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT

被引:0
|
作者
Ellouh, Mahmoud [1 ]
Ghaleb, Mustafa [1 ]
Felemban, Muhamad [2 ]
机构
[1] Kfupm, Interdisciplinary Research Center for Intelligent Secure System, Saudi Arabia
[2] Kfupm, Interdisciplinary Research Center for Intelligent Secure System, Computer Engineering Department, Saudi Arabia
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Electronic data interchange - Zero-day attack
引用
收藏
页码:765 / 771
相关论文
共 50 条
  • [21] An Architecture of Unknown Attack Detection System against Zero-day Worm
    Kim, Ikkyun
    Kim, Daewon
    Kim, Byoungkoo
    Choi, Yangseo
    Yoon, Seongyong
    Oh, Jintae
    Jang, Jongsoo
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 205 - +
  • [22] Defence against the dark art of zero-day attacks
    Madou M.
    Network Security, 2022, 2022 (11)
  • [23] Towards Incorporating a Possibility of Zero-day Attacks into Security Risk Metrics: Work in Progress
    Marbukh, Vladimir
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [24] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [25] Mitigation and Detection of Zero-Day Vulnerabilities
    Sebastian Guisao, Juan
    Toro Rendon, Juan Carlos
    CUADERNO ACTIVA, 2014, (06): : 63 - 67
  • [26] Protecting Embedded Systems from Zero-Day Attacks
    Taylor, Stephen
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
  • [27] Hybrid System to Minimize Damage by Zero-Day Attack based on NIDPS and HoneyPot
    Jeong, Jang Hyeon
    Choi, Seong Gon
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1650 - 1652
  • [28] Real-Time Detection of Distributed Zero-Day Attacks in ad hoc Networks
    Cannady, James
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 72 - 81
  • [29] An adaptable deep learning-based intrusion detection system to zero-day attacks
    Soltani, Mahdi
    Ousat, Behzad
    Siavoshani, Mahdi Jafari
    Jahangir, Amir Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [30] Zero-day Malware Detection using Threshold-free Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 1279 - 1284