dc.contributorInformática
dc.creatorUseche Pelaez, David
dc.creatorDiaz Lopez, Daniel
dc.creatorNespoli, Pantaleone
dc.creatorGomez Marmol, Felix
dc.date.accessioned2021-11-04T16:43:20Z
dc.date.accessioned2022-09-29T14:35:02Z
dc.date.available2021-11-04T16:43:20Z
dc.date.available2022-09-29T14:35:02Z
dc.date.created2021-11-04T16:43:20Z
dc.date.issued2018
dc.identifierhttps://repositorio.escuelaing.edu.co/handle/001/1798
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/3775598
dc.description.abstractThe Internet of Things (IoT) is considered as an emerging technology with considerable potentialities. Its paradigm of everything connected together invaded the real world, with smart objects located in several daily appliances able to communicate autonomously through already existing network infrastructures. On the downside, the great advance carried by IoT in our life brings at the same time serious security issues, since the information flow among the objects remains mainly unprotected from malicious attackers. The paper at hand proposes TRIS, a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using three defense rings, resulting in a more accurate protection. Additionally, we discuss the actual deployment of the sentinel using open-source tools. Exhaustive experiments are conducted on the sentinel, showing that the deployed sentinel performs meticulously even in heavily stressing conditions, thus demonstrating the applicability of TRIS in a distributed and dynamic scenario such as IoT.
dc.description.abstractEl Internet de las cosas (IoT) se considera una tecnología emergente con potencialidades considerables. Su paradigma de todo conectado entre sí invadió el mundo real, con objetos inteligentes ubicados en varios aparatos cotidianos capaces de comunicarse de forma autónoma a través de infraestructuras de red ya existentes. Como contrapartida, el gran avance que ha supuesto el IoT en nuestra vida trae consigo al mismo tiempo graves problemas de seguridad, ya que el flujo de información entre los objetos queda mayoritariamente desprotegido frente a atacantes malintencionados. El artículo que nos ocupa propone TRIS, un novedoso centinela para proteger los entornos inteligentes de las ciberamenazas. Nuestro centinela protege los dispositivos IoT mediante tres anillos de defensa, lo que da como resultado una protección más precisa. Además, analizamos la implementación real del centinela utilizando herramientas de código abierto. Se llevan a cabo experimentos exhaustivos en el centinela, lo que demuestra que el centinela desplegado funciona meticulosamente incluso en condiciones de mucho estrés, lo que demuestra la aplicabilidad de TRIS en un escenario distribuido y dinámico como IoT.
dc.languageeng
dc.publisherIEEE Xplore
dc.publisherSpain
dc.relation15-18 Oct. 2018
dc.relationValencia, Spain
dc.relationN/A
dc.relation2018 Fifth International Conference on Internet of Things: Systems, Management and Security
dc.relationPantaleone. Nespoli and Félix. Gómez Mármol, "e-Health Wireless IDS with SIEM integration", IEEE Wireless Communications and Networking Conference (WCNC' ‘18). Barcelona, 2018.
dc.relationGartner. Gartner's 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage, 2016.
dc.relationSrisakdi. Charmonman and Pornpisud. Mongkhonvanit, "Special consideration for Big Data in IoE or Internet of Everything", 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015)., pp. 147-150, Nov. 2015.
dc.relationYong. Ho Hwang, "IoT Security & Privacy: Threats and Challenges", Proceedings of the 1st ACM Workshop on IoT Privacy Trust and Security. I0TPTS ‘15. Singapore Republic of Singapore: ACM, 2015.
dc.relationMarkus. Miettinen et al., "IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT", 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 2177-2184, June 2017.
dc.relationHuansheng. Ning, Liu. Hong and T. Yang Laurence, "Cyberentity Security in the Internet of Things", Computer, pp. 46-53, Apr. 2013.
dc.relationAlessandro. Sforzin et al., "RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conference on Advanced and Trusted Computing, pp. 440-448, 2016.
dc.relationHuansheng. Ning and Hong. Liu, "Cyber-Physical-Social Based Security Architecture for Future Internet of Things", Advances in Internet of Things, pp. 1-7, Jan. 2012.
dc.relationShin-Ming. Cheng et al., "Traffic-Aware Patching for Cyber Security in Mobile IoT", IEEE Communications Magazine, vol. 7, pp. 29-35, 2017.
dc.relationJonathan. Roux et al., "Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling", 13th European Dependable Computing Conference. Geneva, pp. 147-150, Sept. 2017.
dc.relationYin. Minn Pa Pa et al., "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats", Journal of Information Processing, vol. 3, pp. 522-533, 2016.
dc.relationAl-Sakib. Khan Pathan, The State of the Art in Intrusion Prevention and Detection, Taylor & Francis, 2014.
dc.relationJesse. Varsalone and Matthew. McFadden, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Taylor & Francis, 2011.
dc.relationLatifi. Shahram, "Information Technology: New Generations", 13th International Conference on Information Technology. Advances in Intelligent Systems and Computing. Springer International Publishing, 2016.
dc.relationCiampa. Mark, CompTIA Security+ Guide to Network Security Fundamentals. Cengage Learning 2017.
dc.relationKen. Dunham et al., Android Malware and Analysis, CRC Press, 2014.
dc.relationJoshua J. Drake et al., Android Hacker's Handbook. EBL-Schweitzer, Wiley, 2014.
dc.relationOnur. Savas and Julia. Deng, Big Data Analytics in Cybersecurity. Data Analytics Applications, CRC Press, 2017.
dc.relationMadhu. Akula and Akash. Mahajan, Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security network security and malware analysis, Packt Publishing, 2017.
dc.relationBoštjan. Kaluža, Instant Weka How-to, Packt Publishing, 2013.
dc.relationDaniel. Arp et al., "Drebin: Effective and Explainable Detection of Android Malware in Your Pocket", 21th Annual Network and Distributed System Security Symposium (NDSS)., pp. 23-26, Feb. 2014.
dc.rightshttps://creativecommons.org/licenses/by/4.0/
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.rightsAtribución 4.0 Internacional (CC BY 4.0)
dc.titleTRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
dc.typeDocumento de Conferencia


Este ítem pertenece a la siguiente institución