This thesis provides an overview on the cybersecurity of the Internet of Things (IoT) technology with major focus on the detection and analysis of anomalous and malicious traffic in IoT systems. The document begins with a comprehensive review of the IoT technology, discussing its definitions, features and applications. Next, the key security principles for IoT are described. This section also provides a catalogue of the wide range of cyberattacks striking IoT. In the following, anomalous and malicious traffic detection methods are explored. IoT network attacks and defensive measures will be addressed, providing insights into threat landscapes and proactive security strategies. The concluding segment focuses on analysing detection methods and implementing tools to prevent attacks, ensuring IoT security.
Questa tesi fornisce una panoramica sulla sicurezza dell'Internet of Things (IoT) con un focus principale sulla rilevazione e l'analisi del traffico anomalo e dannoso nei sistemi IoT. Il documento inizia con una revisione completa della tecnologia IoT, discutendo le sue definizioni, caratteristiche e applicazioni. Successivamente, vengono descritti i principi di sicurezza chiave per l'IoT. Questa sezione fornisce anche una panoramica della vasta gamma di attacchi informatici che colpiscono l'IoT. Successivamente vengono esplorate le metodologie di rilevamento del traffico anomalo, analizzando gli attacchi di rete e le misure di difesa.
Anomalous traffic detection in IoT systems
GANCI, LIAM
2023/2024
Abstract
This thesis provides an overview on the cybersecurity of the Internet of Things (IoT) technology with major focus on the detection and analysis of anomalous and malicious traffic in IoT systems. The document begins with a comprehensive review of the IoT technology, discussing its definitions, features and applications. Next, the key security principles for IoT are described. This section also provides a catalogue of the wide range of cyberattacks striking IoT. In the following, anomalous and malicious traffic detection methods are explored. IoT network attacks and defensive measures will be addressed, providing insights into threat landscapes and proactive security strategies. The concluding segment focuses on analysing detection methods and implementing tools to prevent attacks, ensuring IoT security.File | Dimensione | Formato | |
---|---|---|---|
Ganci_Liam.pdf
accesso aperto
Dimensione
8.51 MB
Formato
Adobe PDF
|
8.51 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/67060