NUST Institutional Repository

Semantics based Security Analytics for Internet of Things

Show simple item record

dc.contributor.author Farhat Zaman
dc.date.accessioned 2020-12-23T10:47:10Z
dc.date.available 2020-12-23T10:47:10Z
dc.date.issued 2016
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/19639
dc.description Supervisor: Dr. Zahid Anwar en_US
dc.description.abstract The advent of Internet of Things (IoT) has revolutionized networks by transforming legacy dumb devices into smart connected 'things'; observing, interacting and impacting the environment with minimal human intervention. These features, while promising a variety of innovative solutions and business bene ts, are vulnerable to a host of new threat vectors and security risks. A typical IoT network comprises of thousands of IoT devices using heterogeneous protocols, having varying resources, complex interdependencies and diverse networking and security requirements. The con guration data of IoT networks is mostly unstructured, lacking machine interpretable semantics and thus traditional management techniques cannot tackle the IoT-speci c con guration challenges of scalability, inter-operability and robust security. In order to address these challenges, a formal framework is presented to model IoT con guration data and then employ that model to automatically arrest con guration anomalies and gauge the impact of IoT-speci c attack vectors and accidental malfunctions. The approach reuses existing Web Ontology Language (OWL) based ontologies, by extending them with IoT and security speci c concepts and populating them with IoT instances. Con guration analytics are performed automatically by describing the context of complex IoT interactions and dependencies and security requirements through rulessupported reasoning. An IOT speci c attack taxonomy has been designed based on thorough study of IOT speci c vulnerabilities, exploitation entry points and realtime attack case studies. The practicality of the approach is veri ed through implementation, evaluation and simulation over realistic IoT topologies. Our automated approach has proven to be scalable, easily manageable, formally veri able, visibly applicable through simulations and free from errors induced by tedious manual con gurations. en_US
dc.publisher SEECS, National University of Sciences and Technology, Islamabad en_US
dc.subject Information Security en_US
dc.title Semantics based Security Analytics for Internet of Things en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [146]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account