Network Scanning and Mapping for IIoT Edge Node Device Security.
Matthias NiedermaierFlorian FischerDominik MerliGeorg SiglPublished in: CoRR (2019)
Keyphrases
- virtual private network
- malicious nodes
- security threats
- wireless sensor networks
- remote server
- hidden nodes
- overlapping communities
- security measures
- network nodes
- centrality measures
- cyber attacks
- application level
- path length
- network management
- network traffic
- network services
- network layer
- edge information
- neighboring nodes
- computer networks
- security protection
- network connection
- finding the shortest path
- enterprise network
- internet service providers
- intermediate nodes
- communication networks
- information security
- peer to peer