Defense Scheme to Protect IoT from Cyber Attacks using AI Principles
نویسندگان
چکیده
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملFramework and principles for active cyber defense
This essay offers a broad view of active defense derived from the concept of active air and missile defense. This view admits a range of cyber defenses, many of which are widely deployed and considered essential in today’s threat environment. Instead of equating active defense to hacking back, this wider interpretation lends itself to distinguishing different types of active defense and the leg...
متن کاملDefense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker...
متن کاملHow best to protect the user-individuals in Moscow from cyber crime attacks
This research which is still at it’s initial stages will examine the potential impacts of cyber attacks on Russian society and will determine a framework for pattern recognition from Russian cyber space to identify the major clusters of people’s knowledge and skills in protecting themselves against cyber crime. The main aim of this research is to create the map of Russian society showing the mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computers Communications & Control
سال: 2018
ISSN: 1841-9836,1841-9836
DOI: 10.15837/ijccc.2018.6.3356