International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-10,Issue-5  ( May, 2022 )
Past issues
  1. Volume-10,Issue-4  ( Apr, 2022 )
  2. Volume-10,Issue-3  ( Mar, 2022 )
  3. Volume-10,Issue-2  ( Feb, 2022 )
  4. Volume-10,Issue-1  ( Jan, 2022 )
  5. Volume-9,Issue-12  ( Dec, 2021 )
  6. Volume-9,Issue-11  ( Nov, 2021 )
  7. Volume-9,Issue-10  ( Oct, 2021 )
  8. Volume-9,Issue-9  ( Sep, 2021 )
  9. Volume-9,Issue-8  ( Aug, 2021 )
  10. Volume-9,Issue-7  ( Jul, 2021 )

Statistics report
Aug. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 113
Paper Published : 1372
No. of Authors : 3469
  Journal Paper


Paper Title :
System Call Whitelisting Technique for Reducing Attack Surface in IOT Devices

Author :Lakshmi Eswariponnapu Reddy, Sarat Chandra Babu Nelaturu

Article Citation :Lakshmi Eswariponnapu Reddy ,Sarat Chandra Babu Nelaturu , (2022 ) " System Call Whitelisting Technique for Reducing Attack Surface in IOT Devices " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 1-6, Volume-10,Issue-4

Abstract : Abstract - There is a great demand for the design of cyber-physical systems in the application domains such as healthcare, transportation, surveillance, communication, agriculture, smart cities and so on, due to the rapid penetration of the Internet of Things (IoT). However, we have recently witnessed a number of large-scale malware attacks such as Mirai on IoT networks. Designing secure IoT devices is a challenge due to limited computation and storage capabilities. Attackers are usingvulnerabilities in IoT devices for launching attacks and carry out malicious activities. In the literature, various techniqueshave been proposed for detecting malicious behaviour at runtime. However, because of the restricted resources these techniques are not suitable for IoT devices. For detecting malware behaviour at runtime in IoT devices, we proposed a working set based system call whitelisting technique. The proposed system call based whitelisting technique separates whitelists for the initialization and service phases of field-deployed IoT devices, resulting in reduced attack surface. The proposed technique has been tested on IoT devices and results are promising. Keywords - Cyber-Physical Systems, Communication, Surveillance, Whitelisting

Type : Research paper

Published : Volume-10,Issue-4


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-18558   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 14
| Published on 2022-06-18
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY