scholarly journals Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things

IoT ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Diego Mendez Mena ◽  
Baijian Yang

Security presents itself as one of the biggest threats to the enabling and the deployment of the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity attacks that targeted major internet service providers and crippled a significant portion of the entire Internet by taking advantage of faulty and ill-protected embedded devices. Many of these devices reside at home networks with user-administrators who are not familiar with network security best practices, making them easy targets for the attackers. Therefore, security solutions are needed to navigate the insecure and untrusted public networks by automating protections through affordable and accessible first-hand network information sharing. This paper proposes and implements a proof of concept (PoC) to secure Internet Service Providers (ISPs), home networks, and home-based IoT devices using blockchain technologies. The results obtained support the idea of a distributed cyber threat intelligence data sharing network capable of protecting various stakeholders.

ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


2021 ◽  
Vol 6 ◽  
pp. 102-113
Author(s):  
Alexey Gaivoronski ◽  
◽  
Vasily Gorbachuk ◽  
Maxim Dunaievskiy ◽  
◽  
...  

As computing and Internet connections become general-purpose technologies and services aimed at broad global markets, questions arise about the effectiveness of such markets in terms of public welfare, the participation of differentiated service providers and end-users. Motorola’s Iridium Global Communications project was completed in the 1990s due to similar issues, reaching the goal of technological connectivity for the first time. As Internet services are characterized by high innovation, differentiation and dynamism, they can use well-known models of differentiated products. However, the demand functions in such models are hyperbolic rather than linear. In addition, such models are stochastic and include providers with different ways of competing. In the Internet ecosystem, the links between Internet service providers (ISPs) as telecommunications operators and content service providers are important, especially high-bandwidth video content providers. As increasing bandwidth requires new investments in network capacity, both video content providers and ISPs need to be motivated to do so. In order to analyze the relationships between Internet service providers and content providers in the Internet ecosystem, computable models, based on the construction of payoff functions for all the participants in the ecosystem, are suggested. The introduction of paid content browsing will motivate Internet service providers to invest in increasing the capacity of the global network, which has a trend of exponential growth. At the same time, such a browsing will violate the principles of net neutrality, which provides grounds for the development of new tasks to minimize the violations of net neutrality and maximize the social welfare of the Internet ecosystem. The models point to the importance of the efficiency of Internet service providers, the predictability of demand and the high price elasticity of innovative services.


Author(s):  
Yuji Huang ◽  
Aravindhan K

The present cyber-physical schemes and the Internet of Things (IoT) schemes comprise of both complex and simple interactions defining the different sources of the IoT systems such as cloud information and the edge internet service centres. All the modeling frameworks have been established on the virtualization dimensions that include both the cloud and the edge structures. Apart from that, the systems deal with big data based on the connections of various forms of services and networks. In that case, various forms of data uncertainties are evident. These uncertainties include elasticity and actuation uncertainties. As a result, this leads to a number of challenges that affect the process of testing these uncertainties in the big data systems. Nonetheless, there is a research gap present to effectively model and design the precise infrastructure frameworks that handle the necessities for evaluating these emergent big data uncertainties. With that regard, this scholastic paper focusses on the techniques used to generate and determine the deployment configurations used in the process of evaluating both the cloud and IoT systems. In this research, the survey will consider the actual-world application for analysing and monitoring the transceiver frameworks.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


Author(s):  
Phaedon John Kozyris

The ordinary and uncomplicated Spam menace is made possible by technological advances which enable the sender to dispatch millions if not billions of commercial messages without significant monetary cost and without wasting time. The present review will focus on fundamentals, exploring what has already been done and suggesting avenues of improvement. The chapter promotes basic approaches of handling Spam depending on the actions and choices of the receiver. The anti-Spam campaign needs effective enforcement powers and should be able to use all available technological know-how. As the vagaries of enforcement are presented, the role of the Internet Service Providers and advertisers is envisaged.


Sign in / Sign up

Export Citation Format

Share Document