Proceedings of the 2018 Workshop on IoT Security and Privacy 2018
DOI: 10.1145/3229565.3229566
|View full text |Cite
|
Sign up to set email alerts
|

Clear as MUD

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 83 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Digital evidence, similar to physical evidence, seized at a crime scene or following a security incident, is relevant during digital forensic investigations [67]. The majority of the primary studies have researched a subset of an IR process, predominantly focusing on the "detection and analysis" phase (Figure 10) of an incident utilising different approaches including profile detection, behavioural anomaly, system monitoring or audit analysis [47,48,65,99,100,103,104,108,120,123,124,127]. Whilst incidents' detection is a reactive activity by nature, it is a key enabler for subsequent digital forensic processes, which cannot occur without detection and identification of an incident.…”
Section: Discussionmentioning
confidence: 99%
“…Digital evidence, similar to physical evidence, seized at a crime scene or following a security incident, is relevant during digital forensic investigations [67]. The majority of the primary studies have researched a subset of an IR process, predominantly focusing on the "detection and analysis" phase (Figure 10) of an incident utilising different approaches including profile detection, behavioural anomaly, system monitoring or audit analysis [47,48,65,99,100,103,104,108,120,123,124,127]. Whilst incidents' detection is a reactive activity by nature, it is a key enabler for subsequent digital forensic processes, which cannot occur without detection and identification of an incident.…”
Section: Discussionmentioning
confidence: 99%
“…IoT device manufacturers have not yet provided MUD profiles for their devices. But, we released the MUD profiles (automatically generated from packet traces) for 28 consumer IoT devices [30] -in this paper, we use a subset of those profiles corresponding to devices that we experiment with.…”
Section: Mud Profilementioning
confidence: 99%
“…Several approaches to automated MUD file generation 544 currently exist. These include one devised by a researcher at the University of Twente [8], and an open-source tool created by the University of New South Wales (UNSW) called MUDgee [9]. The MUDgee tool takes a single network traffic capture file and generates a MUD file based on the observed network behavior.…”
Section: Mud-pdmentioning
confidence: 99%