Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Meidan, Yair"'
A key challenge associated with Kubernetes configuration files (KCFs) is that they are often highly complex and error-prone, leading to security vulnerabilities and operational setbacks. Rule-based (RB) tools for KCF misconfiguration detection rely o
Externí odkaz:
http://arxiv.org/abs/2405.19954
Publikováno v:
Computers & Security, 126, 103073 (2023)
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks using network traffic analysis, it has been shown that
Externí odkaz:
http://arxiv.org/abs/2303.01041
Although home IoT (Internet of Things) devices are typically plain and task oriented, the context of their daily use may affect their traffic patterns. For this reason, anomaly-based intrusion detection systems tend to suffer from a high false positi
Externí odkaz:
http://arxiv.org/abs/2303.01021
Today, telecommunication service providers (telcos) are exposed to cyber-attacks executed by compromised IoT devices connected to their customers' networks. Such attacks might have severe effects not only on the target of attacks but also on the telc
Externí odkaz:
http://arxiv.org/abs/1905.13430
The current generation of IoT devices is being used by clients and consumers to regulate resources (such as water and electricity) obtained from critical infrastructure (such as urban water services and smart grids), creating a new attack vector agai
Externí odkaz:
http://arxiv.org/abs/1808.02131
Autor:
Meidan, Yair, Bohadana, Michael, Mathov, Yael, Mirsky, Yisroel, Breitenbacher, Dominik, Shabtai, Asaf, Elovici, Yuval
The proliferation of IoT devices which can be more easily compromised than desktop computers has led to an increase in the occurrence of IoT based botnet attacks. In order to mitigate this new threat there is a need to develop new methods for detecti
Externí odkaz:
http://arxiv.org/abs/1805.03409
Autor:
Meidan, Yair, Bohadana, Michael, Shabtai, Asaf, Ochoa, Martin, Tippenhauer, Nils Ole, Guarnizo, Juan Davis, Elovici, Yuval
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require a
Externí odkaz:
http://arxiv.org/abs/1709.04647
Publikováno v:
In Computers & Security July 2021 106
Autor:
Meidan, Yair, Sachidananda, Vinay, Peng, Hongyi, Sagron, Racheli, Elovici, Yuval, Shabtai, Asaf
Publikováno v:
In Computers & Security October 2020 97
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.