Essays about: "IoT attacks"

Showing result 1 - 5 of 97 essays containing the words IoT attacks.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  2. 2. Extending energy attack mitigation to multiple IoT devices

    University essay from Uppsala universitet/Datorteknik

    Author : Patrik Johansson; [2023]
    Keywords : ;

    Abstract : A subset of IoT devices in use today rely on energy harvesting technologies for power. This means that rather than being connected to a larger energy grid or using batteries these devices source their energy from their environment, for example by using solar cells. READ MORE

  3. 3. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

    University essay from Uppsala universitet/Datorteknik

    Author : Victoria Bull; [2023]
    Keywords : Internet of Things; IoT; intrusion detection; routing attacks;

    Abstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE

  4. 4. Exploring GANs to generate attack-variations in IoT networks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Gustaf Bennmarker; [2023]
    Keywords : ;

    Abstract : Data driven IDS development requires a vast amount of data to be effective against future attacks and a big problem is the lack of available data. This thesis explores the use of GANs (Generative adversarial networks) in generating attack data that can be used as apart of a training set for an IDS to improve the robustness against adversarial attacks. READ MORE

  5. 5. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE