Cells - A Novel IOT Security Approach

被引:0
|
作者
Loh, Peter K. K. [1 ]
Loh, Brian W. Y. [2 ]
机构
[1] Singapore Inst Technol, Infocomm Technol Cluster, 10 Dover Dr, Singapore 138683, Singapore
[2] Distek Enterprises Pte Ltd, 10 Anson Rd,26-04 Int Plaza, Singapore 079903, Singapore
关键词
cyber-attack; threat monitoring and detection; APT; Internet-of-Things security; micro-agents; sandbox;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent commercial products have been developed for computational and enterprise systems which use virtual execution environments for monitoring, detecting and responding to known and unknown security threats. This paper presents a novel lightweight micro-agent approach that monitors, detects and responds to these threats based on resource usage attributes on the actual operating environment of digital platforms and low footprint devices.
引用
下载
收藏
页码:3716 / 3719
页数:4
相关论文
共 50 条
  • [21] Layered management approach to cyber security of IoT solutions
    Ozdogan, Erdal
    Das, Resul
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (05) : 493 - 504
  • [22] A Hybrid Approach For Enhancing Security In Internet Of Things (IoT)
    Kumar, M. Tanooj
    Katragadda, Revanth Kumar
    Kolli, Vishnu Srujan
    Rahiman, Shaik Lahir
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 110 - 114
  • [23] A Process Mining Approach for Supporting IoT Predictive Security
    Hemmer, Adrien
    Badonnel, Remi
    Chrisment, Isabelle
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [24] An IoT middleware for enhanced security and privacy: the RERUM approach
    Moldovan, George
    Tragos, Elias Z.
    Fragkiadakis, Alexandros
    Poehls, Henrich C.
    Calvo, Daniel
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [25] IoT Security Model and Performance Evaluation: A Blockchain Approach
    Wang, Ziyan
    Dong, Xinghua
    Li, Yi
    Fang, Li
    Chen, Ping
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 260 - 264
  • [26] IoT Security Risk Management: A Framework and Teaching Approach
    Affia, Abasi-amefon O.
    Nolte, Alexander
    Matulevicius, Raimundas
    INFORMATICS IN EDUCATION, 2023, 22 (04): : 555 - 588
  • [27] A Hybrid Trust-Modeling Approach for IoT Security
    Bahtiyar, Serif
    ELECTRICA, 2020, 20 (01): : 86 - 96
  • [28] Why IoT security is failing. The Need of a Test Driven Security Approach
    Sandescu, Cristian
    Grigorescu, Octavian
    Rughinis, Razvan
    Deaconescu, Razvan
    Calin, Mihnea
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [29] IoT-Security approach analysis for the novel nutrition-based vegetable production and distribution system
    Ludena, Dennis A. R.
    Ahrary, Alireza
    Horibe, Noriko
    Won-Seok, Yang
    2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), 2014, : 185 - 189
  • [30] A Novel Approach of Cloud Computing Network for Authentication and Security Enhancement of IoT Enabled Cancer Forecasting System
    Ampavathi, Anusha
    Rao, Dhawaleswar
    Nagalakshmi, T.
    Muruganandam, S.
    Magendiran, N.
    Padmaja, I. Naga
    Selvam, K.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (07) : 518 - 534