Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/1727
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Memos, Vasileios A. | - |
dc.contributor.author | Psannis, Kostas E. | - |
dc.date.accessioned | 2023-11-13T08:03:20Z | - |
dc.date.available | 2023-11-13T08:03:20Z | - |
dc.date.issued | 2022 | - |
dc.identifier | 10.1109/IOTM.001.2100175 | en_US |
dc.identifier.issn | 2576-3180 | en_US |
dc.identifier.issn | 2576-3199 | en_US |
dc.identifier.uri | https://doi.org/10.1109/IOTM.001.2100175 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/1727 | - |
dc.description.abstract | The Internet of Things (IoT) is the upcoming network that aspires to interconnect “things” to each other and to the Internet. Many such “things” like smart devices and wireless sensors are already connected to the Internet, improving human life worldwide. These things can also have artificial intelligence, providing many capabilities to their users. However, such IoT-based devices hide risks since they are usually small devices with constrained resources, and hence do not have sufficient built-in security mechanisms. In addition, the increase of such devices with geometric regression worries network administrators who must take countermeasures to restrict and eliminate attackers who aim to turn the IoT into a Botnet of Things network, using compromised devices as bots to unleash distributed-denial-of-service and man-in-the-middle attacks, or/and spread various types of malware. Thus, they can have unauthorized access and steal very sensitive data from users for malicious purposes. In this article, we highlight the problem caused by the uncontrolled development of insecure IoT-based devices and describe an effective network functions virtualization infrastructure in combination with emerging technologies that could provide smart management and enhanced protection against botnet attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.rights | Attribution-NonCommercial 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | * |
dc.source | IEEE Internet of Things Magazine | en_US |
dc.subject | FRASCATI::Natural sciences::Computer and information sciences | en_US |
dc.subject | FRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineering | en_US |
dc.subject | FRASCATI::Engineering and technology::Mechanical engineering | en_US |
dc.subject | FRASCATI::Engineering and technology::Other engineering and technologies | en_US |
dc.subject.other | Privacy | en_US |
dc.subject.other | Wireless sensor networks | en_US |
dc.subject.other | Botnet | en_US |
dc.subject.other | Internet of Things | en_US |
dc.subject.other | Malware | en_US |
dc.subject.other | Network function virtualization | en_US |
dc.subject.other | Security | en_US |
dc.subject.other | Artificial intelligence | en_US |
dc.title | NFV-Based Scheme for Effective Protection against Bot Attacks in AI-Enabled IoT | en_US |
dc.type | Article | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.volume | 5 | en_US |
local.identifier.issue | 1 | en_US |
local.identifier.firstpage | 91 | en_US |
local.identifier.lastpage | 95 | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
NFV-based Scheme for Effective Protection against Bot Attacks in AI-enabled IoT.pdf | 395,76 kB | Adobe PDF | Προβολή/Ανοιγμα |
Αυτό το τεκμήριο προστατεύεται από Αδεια Creative Commons