Abstract
The Internet of Things (IoT) ecosystem is composed largely of heterogeneous internet-based devices, which generate an enormous volume of data every day; this includes sensors, smart devices, and other industrialised modules. However, the complexity of the IoT ecosystem and the quantity of IoT devices available have
dramatically increased the volume of both emerging and persistent security vulnerabilities from edge to cloud computing infrastructure, principally due to security problems arising from embedded devices and other legacy hardware. Further, with the emerging IoT technologies, malware campaigns and criminal motivations are
increasingly exploiting these underlying services and existing vulnerabilities. In the Cyber-Trust project, we aim to address these security issues to support the growth of the IoT ecosystem while mitigating the resulting complexity and vulnerability when protecting IoT devices. This chapter presents an overview of the IoT devices profiling and threat detection solution proposed by Cyber-Trust to tackle the grand challenges of securing the IoT devices’ ecosystem. In addition, the effectiveness and performance of the proposed solution are in-depth verified, especially against botnets and Zero-day attacks.
dramatically increased the volume of both emerging and persistent security vulnerabilities from edge to cloud computing infrastructure, principally due to security problems arising from embedded devices and other legacy hardware. Further, with the emerging IoT technologies, malware campaigns and criminal motivations are
increasingly exploiting these underlying services and existing vulnerabilities. In the Cyber-Trust project, we aim to address these security issues to support the growth of the IoT ecosystem while mitigating the resulting complexity and vulnerability when protecting IoT devices. This chapter presents an overview of the IoT devices profiling and threat detection solution proposed by Cyber-Trust to tackle the grand challenges of securing the IoT devices’ ecosystem. In addition, the effectiveness and performance of the proposed solution are in-depth verified, especially against botnets and Zero-day attacks.
Original language | English |
---|---|
Title of host publication | Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation |
Editors | Gohar Sargsyan, Dimitrios Kavallieros, Nicholas E. Kolokotronis |
Publisher | Now Publishers Inc |
Pages | 74-91 |
Number of pages | 18 |
ISBN (Electronic) | 9781680838350 |
ISBN (Print) | 9781680838343 |
DOIs | |
Publication status | Published - 25 Mar 2022 |