Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes.
Nazia SharminChristopher KiekintveldPublished in: IOTSMS (2023)
Keyphrases
- security problems
- security mechanisms
- security threats
- security issues
- computer security
- security protocols
- java card
- cyber attacks
- key management
- security measures
- security requirements
- denial of service attacks
- security vulnerabilities
- computer networks
- countermeasures
- security risks
- access control
- information security
- security breaches
- malicious attacks
- data security
- chosen plaintext
- cryptographic protocols
- intrusion detection
- resource constrained
- stream cipher
- information leakage
- fault injection
- biometric template
- insider attacks
- buffer overflow
- attribute values
- secure routing
- cloud computing
- security flaws
- management system
- malicious users
- virtual private network
- intrusion detection and prevention
- ddos attacks
- unauthorized access
- network security
- block cipher
- anomaly detection
- smart card
- watermarking scheme
- rfid systems
- security policies
- watermarking algorithm
- secret key