The rapid advancement of technology and the widespread adoption of digitalization have led to an increasing prevalence of interconnected devices. Despite their small physical size, possess significant computational capabilities and are now ubiquitous in both domestic and industrial environments. They are revolutionizing various sectors, including transportation safety, health management, and sports environments. These interconnected devices rely on communication technologies such as WiFi, Bluetooth, and Zigbee. They allow us to monitor health, interact with users, and navigate efficiently. In industrial settings, they optimize production and delivery plans, reducing management overhead and enhancing job security. However, this proliferation of connected devices introduces a critical concern: cybersecurity. Ensuring the confidentiality, integrity, and availability of data becomes crucial. As the attack surface expands, malicious actors target not only data security but also people’s safety. Well-known vulnerabilities include Denial-of-Service (DoS/DDoS) attacks, malware, ransomware, phishing, and Man-in-the-Middle (MitM) exploits. To counter these threats, various techniques have emerged. Intrusion Detection Systems, Intrusion Prevention Systems, firewalls, antivirus software, and even blockchain technologies play crucial roles. These systems analyze network traffic, inspect data, and apply rules to intercept malicious activities. However, vulnerabilities persist due to bugs, outdated firmware, and human error. About that, this work aims to address information security challenges. It focuses on two main objectives: Analysis of Cybersecurity Issues: Investigating major problems across different application domains, with a special emphasis on smart mobility and smart industry. Developing Detection Systems: Creating a non-invasive hardware and software solution that combines various information gathered from different TCP/IP layers. By analyzing, the system can detect anomalies indicative of cyber attacks.
Proposal of measurement-based IDSs for cybersecurity in IoT applications / Amodei, Andrea. - (2024 Jul 18).
Proposal of measurement-based IDSs for cybersecurity in IoT applications
AMODEI, Andrea
2024-07-18
Abstract
The rapid advancement of technology and the widespread adoption of digitalization have led to an increasing prevalence of interconnected devices. Despite their small physical size, possess significant computational capabilities and are now ubiquitous in both domestic and industrial environments. They are revolutionizing various sectors, including transportation safety, health management, and sports environments. These interconnected devices rely on communication technologies such as WiFi, Bluetooth, and Zigbee. They allow us to monitor health, interact with users, and navigate efficiently. In industrial settings, they optimize production and delivery plans, reducing management overhead and enhancing job security. However, this proliferation of connected devices introduces a critical concern: cybersecurity. Ensuring the confidentiality, integrity, and availability of data becomes crucial. As the attack surface expands, malicious actors target not only data security but also people’s safety. Well-known vulnerabilities include Denial-of-Service (DoS/DDoS) attacks, malware, ransomware, phishing, and Man-in-the-Middle (MitM) exploits. To counter these threats, various techniques have emerged. Intrusion Detection Systems, Intrusion Prevention Systems, firewalls, antivirus software, and even blockchain technologies play crucial roles. These systems analyze network traffic, inspect data, and apply rules to intercept malicious activities. However, vulnerabilities persist due to bugs, outdated firmware, and human error. About that, this work aims to address information security challenges. It focuses on two main objectives: Analysis of Cybersecurity Issues: Investigating major problems across different application domains, with a special emphasis on smart mobility and smart industry. Developing Detection Systems: Creating a non-invasive hardware and software solution that combines various information gathered from different TCP/IP layers. By analyzing, the system can detect anomalies indicative of cyber attacks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.