Cells - A Novel IOT Security Approach

被引:0
|
作者
Loh, Peter K. K. [1 ]
Loh, Brian W. Y. [2 ]
机构
[1] Singapore Inst Technol, Infocomm Technol Cluster, 10 Dover Dr, Singapore 138683, Singapore
[2] Distek Enterprises Pte Ltd, 10 Anson Rd,26-04 Int Plaza, Singapore 079903, Singapore
关键词
cyber-attack; threat monitoring and detection; APT; Internet-of-Things security; micro-agents; sandbox;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent commercial products have been developed for computational and enterprise systems which use virtual execution environments for monitoring, detecting and responding to known and unknown security threats. This paper presents a novel lightweight micro-agent approach that monitors, detects and responds to these threats based on resource usage attributes on the actual operating environment of digital platforms and low footprint devices.
引用
收藏
页码:3716 / 3719
页数:4
相关论文
共 50 条
  • [1] A Novel Approach for Security of Data in IoT Environment
    Urla, Priyanka Anurag
    Mohan, Girish
    Tyagi, Sourabh
    Pai, Smitha N.
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [2] A Novel Approach to IoT Security Based on Immunology
    Liu, Caiming
    Zhang, Yan
    Zhang, Huaqiang
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 771 - 775
  • [3] Data Conformity Evaluation: A Novel Approach for IoT Security
    Verzegnassi, Enrico Giulio Maria
    Tountas, Konstantinos
    Pados, Dimitris A.
    Cuomo, Francesca
    [J]. 2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 842 - 846
  • [4] A systemic approach for IoT security
    Riahi, Arbia
    Challal, Yacine
    Natalizio, Enrico
    Chtourou, Zied
    Bouabdallah, Abdelmadjid
    [J]. 2013 9TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2013), 2013, : 351 - 355
  • [5] Enhancing IoT security in MANETs: A novel adaptive defense reinforcement approach
    Saravanan, S.
    Surya, V.
    Valarmathi, V.
    Nalina, E.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2282 - 2297
  • [6] Quantum IoT: A Quantum Approach in IoT Security Maintenance
    Rahman, Md Samin
    Hossam-E-Haider, Md
    [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), 2019, : 269 - 272
  • [7] A Model Obfuscation Approach to IoT Security
    Guo, Yunqi
    Tan, Zhaowei
    Chen, Kaiyuan
    Lu, Songwu
    Wu, Ying Nian
    [J]. 2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 1 - 9
  • [8] A systemic and cognitive approach for IoT security
    Riahi, Arbia
    Natalizio, Enrico
    Challal, Yacine
    Mitton, Nathalie
    Iera, Antonio
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 183 - 188
  • [9] DATA SECURITY APPROACH IN IOT ENVIRONMENT
    Sawardekar, Shruti
    Pawar, Renuka
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [10] A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
    Syed Abdul Moeed
    Ramesh Karnati
    G. Ashmitha
    Gouse Baig Mohammad
    Sachi Nandan Mohanty
    [J]. SN Computer Science, 5 (6)