Essays about: "IoT attacks"
Showing result 1 - 5 of 97 essays containing the words IoT attacks.
-
1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
2. Extending energy attack mitigation to multiple IoT devices
University essay from Uppsala universitet/DatorteknikAbstract : A subset of IoT devices in use today rely on energy harvesting technologies for power. This means that rather than being connected to a larger energy grid or using batteries these devices source their energy from their environment, for example by using solar cells. READ MORE
-
3. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View
University essay from Uppsala universitet/DatorteknikAbstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE
-
4. Exploring GANs to generate attack-variations in IoT networks
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Data driven IDS development requires a vast amount of data to be effective against future attacks and a big problem is the lack of available data. This thesis explores the use of GANs (Generative adversarial networks) in generating attack data that can be used as apart of a training set for an IDS to improve the robustness against adversarial attacks. READ MORE
-
5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE