Advanced search

Showing result 1 - 5 of 15 essays matching the above criteria.

  1. 1. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  2. 2. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Hossein Keipour; [2022]
    Keywords : IoT; 6LoWPAN; RPL; Intrusion Detection System; Machine Learning;

    Abstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE

  3. 3. Scanning and Host Fingerprinting Methods for Command and Control Server Detection

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yuki Nakamura; Björn Åström; [2021]
    Keywords : command and control; C2; CnC; botnet; scanning; probing;

    Abstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE

  4. 4. Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johannes Olegård; [2020]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. READ MORE

  5. 5. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE