2020 International Conference on Information and Communication Technology Convergence (ICTC) 2020
DOI: 10.1109/ictc49870.2020.9289632
|View full text |Cite
|
Sign up to set email alerts
|

Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Novel approaches to network segmentation for IoT access control have been put forth in a number of research. In order to stop risks from spreading over the IoT networks, Lim [43] proposes a smart segmentation system that makes use of device features, network information, and service kinds. In order to minimize the attack surface, Vaere [44] presents Hopper, a security system that isolates each network host into a separate, access-controlled micro segment.…”
Section: Overview Of Iot Access Control Mechanismsmentioning
confidence: 99%
“…Novel approaches to network segmentation for IoT access control have been put forth in a number of research. In order to stop risks from spreading over the IoT networks, Lim [43] proposes a smart segmentation system that makes use of device features, network information, and service kinds. In order to minimize the attack surface, Vaere [44] presents Hopper, a security system that isolates each network host into a separate, access-controlled micro segment.…”
Section: Overview Of Iot Access Control Mechanismsmentioning
confidence: 99%
“…For lower-capability IoT devices that may exist in a variety of home appliances, It is necessary to use other techniques which are faster and require a limited amount of processing power and memory. For instance, a lightweight security scheme is designed to limit network access using segment units set with various device features, network information, and service types [9]. The architecture's capacity to prevent the propagation of threats on the IoT network was validated by the suppression of botnet creation in the botnet creation experiment testbed using the Mirai virus.…”
Section: Related Workmentioning
confidence: 99%
“…Lim et al [13] proposed a smart segmentation framework with attention to the usage of the Domain Generation Algorithm (DGA) in the botnet malware. The smart segmentation framework detects the botnet malware by considering the behavior of querying domain names other than the reference, which is domain names with those of servers normally operated at IoT services, ones as botnet malware's behavior.…”
Section: Malware Detection Techniquesmentioning
confidence: 99%
“…This tool verifies the functionality and performance of network-based malware detection and threat prevention solutions that detects and blocks spreading threats within the IoT infrastructure. It is especially suitable for use in verifying the smart segmentation framework [13] among techniques to prevent malware propagation attacks. We consider that the malware attack is a kind of threats spreading in the network Therefore, the malware simulation tool is implemented based on Mirai malware, which informed the seriousness of IoT security and also was released its source code on the Internet.…”
Section: Malware Simulation Toolmentioning
confidence: 99%
See 1 more Smart Citation