Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

Preprint English OPEN
Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay;
  • Subject: Computer Science - Cryptography and Security

IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of ... View more
  • References (31)
    31 references, page 1 of 4

    [1] MUD maker., 2018.

    [2] A. Basu and R. Blanning. Metagraphs and their applications, volume 15. Springer Science & Business Media, 2007.

    [3] S. Boddy and J. Shattuck. The Hunt for IoT: The Rise of Thingbots. Technical report, F5 Labs, July 2017.

    [4] E. Byres, J. Karsch, and J. Carter. NISCC good practice guide on firewall deployment for SCADA and process control networks. NISCC, 2005.

    [5] Cisco Systems. Cisco ASA Series CLI Configuration Guide, 9.0. Cisco Systems, Inc., 2013.

    [6] FCC. Federal Communications Comssion Response 12-05-2016. https: //, 2016.

    [7] K. D. Gourley and D. M. Green. Polygon-to-rectangle conversion algorithm. IEEE CGA, pages 31-32, 1983.

    [8] A. Hamza. MUDgee., 2018.

    [9] S. Hilton. Dyn Analysis Summary Of Friday October 21 Attack. https: //, 2016.

    [10] Juniper Networks, Inc. Getting Started Guide for the Branch SRX Series. 1133 Innovation Way, Sunnyvale, CA 94089, USA, 2016.

  • Related Research Results (1)
    Inferred by OpenAIRE
    mudgee software on GitHub
  • Metrics
Share - Bookmark