25 November 2021

A Two-fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks

The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of Things (IoT) environment that initiates with scanning activity and ends at the distributed denial of service (DDoS) attack…

September 2021

Generic signature development for IoT Botnet families

As the source code of various IoT botnet families including Mirai has been made publicly available, the adversaries are drastically introducing new variants of these IoT Botnet families. However, there is a lack of generic mechanism for the detection of…

14 July 2021

Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach

Internet of things (IoT) is a technology that enables our daily life objects to connect on the Internet and to send and receive data for a meaningful purpose. In recent years, IoT has led to many revolutions in almost every sector of our society…

26 April 2021

A Framework for Malicious Traffic Detection in IoT Healthcare Environment

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT…

January 2021

A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application

Industrial IoT (IIoT) is a specialized subset of IoT which involves the interconnection of industrial devices with ubiquitous control and intelligent processing services to improve industrial system’s productivity…

09 February 2021

IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source

In this research we propose a framework that will strengthen the IoT devices security from dual perspectives; avoid devices to become attack target as well as a source of an attack. Unlike traditional devices, IoT devices are equipped with insufficient…

23 Dec 2020

A survey of internet of things operating systems with cyber assurance

Machine-to-machine (M2M) is an ecosystem which is used to describe any technology deploying and creating a network of devices to perform actions and exchange information. This new class of communicating devices…

6 Jan 2021

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for…

20-21 Oct 2020

Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis

The prevalent use of IoT has raised numerous security concerns in recent times. One particular vulnerability in IoT ecosystem is weak authentication credentials. A large number of IoT attacks exploit such vulnerabilities. Emerged in 2016, the…

5-7 Nov 2020

IoT DoS and DDoS Attack Detection using ResNet

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most…

1 Dec 2020

Towards a Universal Features Set for IoT Botnet Attacks Detection

The security pitfalls of IoT devices make it easy for the attackers to exploit the IoT devices and make them a part of a botnet. Once hundreds of thousands of IoT devices are compromised and become the part of a botnet, the attackers use this botnet to launch the large and…

9-13 Dec 2019

MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices

Devices in Internet of Things (IoT) applications are mostly heterogeneous in nature with constrained resources. There is an ominous need to develop inter-operable yet secure solution for such devices which, , however, cannot be achieved without following…

17-19 June 2019

An Auditing Framework for Vulnerability Analysis of IoT System

Introduction of IoT is a big step towards the convergence of physical and virtual world as everyday objects are connected to the internet nowadays. But due to its diversity and resource constraint nature, the security of these devices in the real world…

19 August 2019

OneM2M architecture based secure MQTT binding in Mbed OS

One of the vital research challenge in cyber physical systems is to provide secure communication among multi-vendor devices. OneM2M is a standardization initiative for Internet of Things (IoT) and machine-to-machine…

9-13 Dec 2019