Karlo Slovenec, Marin Vukovic, Denis Salopek, M. Mikuc
{"title":"基于安全需求类别保护物联网服务","authors":"Karlo Slovenec, Marin Vukovic, Denis Salopek, M. Mikuc","doi":"10.23919/softcom55329.2022.9911319","DOIUrl":null,"url":null,"abstract":"Internet of things (IoT) is now a well-established term and almost every imaginable field of human work has, or can have, some application of IoT. The vast applications of IoT are typically characterized by very good domain-specific solutions (e.g. industrial IoT, smart home devices, etc.), but also very often lack security-related functionalities, The consequence of this fact are numerous attacks that target IoT devices due to their typical lack of security functions. In this paper, our aim is to determine whether a general intrusion detection system could be applied to networks of IoT devices. Based on previous work, we propose multiple intrusion detection models that vary in their complexity and strictness for IoT services with higher and lower security requirements. Finally, an evaluation of the proposed models on a real traffic dataset is discussed","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing IoT Services Based on Security Requirement Categories\",\"authors\":\"Karlo Slovenec, Marin Vukovic, Denis Salopek, M. Mikuc\",\"doi\":\"10.23919/softcom55329.2022.9911319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things (IoT) is now a well-established term and almost every imaginable field of human work has, or can have, some application of IoT. The vast applications of IoT are typically characterized by very good domain-specific solutions (e.g. industrial IoT, smart home devices, etc.), but also very often lack security-related functionalities, The consequence of this fact are numerous attacks that target IoT devices due to their typical lack of security functions. In this paper, our aim is to determine whether a general intrusion detection system could be applied to networks of IoT devices. Based on previous work, we propose multiple intrusion detection models that vary in their complexity and strictness for IoT services with higher and lower security requirements. Finally, an evaluation of the proposed models on a real traffic dataset is discussed\",\"PeriodicalId\":261625,\"journal\":{\"name\":\"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/softcom55329.2022.9911319\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/softcom55329.2022.9911319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing IoT Services Based on Security Requirement Categories
Internet of things (IoT) is now a well-established term and almost every imaginable field of human work has, or can have, some application of IoT. The vast applications of IoT are typically characterized by very good domain-specific solutions (e.g. industrial IoT, smart home devices, etc.), but also very often lack security-related functionalities, The consequence of this fact are numerous attacks that target IoT devices due to their typical lack of security functions. In this paper, our aim is to determine whether a general intrusion detection system could be applied to networks of IoT devices. Based on previous work, we propose multiple intrusion detection models that vary in their complexity and strictness for IoT services with higher and lower security requirements. Finally, an evaluation of the proposed models on a real traffic dataset is discussed