Conception de filtre d'un réseau d'objets connectés par apprentissage profondpar Sandra Rochelle NYABENG MINEME SUP'PTIC - Ingénieur de sécurité des réseaux et des systemes 2015 |
ANNEXES 2Figure 45 : Partie 1 résultat du modèle d'identification des objets Figure 46 : Partie 2 résultat du modèle d'identification des objets ANNEXES 3Figure 47 : Résultats des travaux d'IoT Sentinel RÉFÉRENCES[1] https://safeatlast.co/blog/iot-statistics/#gref consulté le 15/09/2020 [2] peut on sécuriser l'internet des objets du blogueur d'Olivier Ezratty consulté le 15/09/2020 [3] https://www.kaspersky.com/about/press-releases/2019_iot-under-fire-kaspersky-detects-more-than-100-million-attacks-on-smart-devices-in-h1-2019 consulté le 17/09/2020 [4] Pallavi Sethi and Smruti R.. Review Article «Internet of Things: Architectures, Protocols, and Applications Sarangi Department of Computer Science», IIT Delhi, New Delhi, India [5] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung . «A MIDDLEWARE FOR THE INTERNET OF THINGS School of Computing, Engineering and Mathematics», Western Sydney University, Sydney, Australia. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 DOI : 10.5121/ijcnc.2016.8214 159 [6] « Internet des objets: architectures, protocoles et applications » de Pallavi Sethi et Smruti R. Sarangi publié sur Hindawi Journal of Electrical and Computer Engineering Volume 2017, Article ID 9324035, 25 pages https://doi.org/10.1155/2017/9324035 [7]Le projet AWASP 2018 voir sur : https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf consulté le 25/10/2020 [8] Shafiq Ul Rehman et Selvakumar Manickam. « A Study of Smart Home Environment and it's Security Threats», Article in International Journal of Reliability Quality and Safety Engineering · May 2016 DOI: 10.1142/S021853931640005.Voir https://www.researchgate.net/publication/303089918 [9] https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/ [10] https://fullcirclemagazine.org/2016/09/04/bashlite-malware-turning-millions-of-linux-based-iot-devices-into-ddos-botnet/ consulté le 1/11/2020 [11] https://www.cyberswachhtakendra.gov.in/alerts/BrickerBot_IoT_Malware.html [12] https://unit42.paloaltonetworks.com/muhstik-botnet-attacks-tomato-routers-to-harvest-new-iot-devices/ consulté le 16/11/2020 [13] https://unit42.paloaltonetworks.com/muhstik-botnet-exploits-the-latest-weblogic-vulnerability-for-cryptomining-and-ddos-attacks/ consulté le 16/11/2020 [14] https://labs.bitdefender.com/2018/09/hide-and-seek-iot-botnet-learns-new-tricks-uses-adb-over-internet-to-exploit-thousands-of-android-devices/ [15] https://www.malwaretech.com/2019/01/tracking-the-hide-and-seek-bonet.html#:~:text=Hide%20and%20Seek%20(HNS)%20is,well%20as%20some%20old%20CVEs. Consulté le 15/11/220 [16]Markus Miettinen, Ahmad-Reza Sadeghi, Samuel Marchal , N. Asokan, Ibbad Hafeez, Sasu Tarkoma, «IOT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT», page 1-5 [17] https://cve.mitre.org/about/faqs.html [18] https://connect.ed-diamond.com/MISC/MISC-064/BSD-Packet-Filter consulté le 20/09/2020
[19] Bruno Cruz , Silvana Go'mez-Meire , David Ruano-Orda's , Helge Janicke, Iryna Yevseyeva , and Jose R. Me'ndez . «A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.» consulté le 15/01/2021 [21] https://www.investiraucameroun.com/entreprises/1006-12769-a-fin-avril-2019-l-electricien-camerounais-eneo-installe-environ-4000-compteurs-intelligents-dans-les-menages consulté le 15/01/2021 [22] https://cybermap.kaspersky.com/fr/stats#country=210&type=BAD&period=w consulté le 19/01/2021 [23] https://map.lookingglasscyber.com/ consulté le 19/01/2021 [24] Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer, « Analysis of Firewall Policy Rules Using Data Mining Techniques », Department of Computer Science The University of Texas at Dallas Richardson, USA, School of Computer Science, Telecommunications and Information Systems DePaul University Chicago, USA [25] https://www.infor.uva.es/~teodoro/neuro-intro.pdf Ben Krose & Patrick van der Smagt, «An introduction to neural network», Faculty of Mathematics Computer Science, Institute of Robotics and System Dynamics, University of Amsterdam, German Aerospace Research Establishment [26] http://colah.github.io/posts/2015-08-Understanding-LSTMs/ consulté le 09/12/2020 [27] https://effeuillage-la-revue.fr/portfolio-item/le-fingerprinting/ [28]Tadayoshi Kohno, CSE Department, UC San Diego & Andre Broido CAIDA, UC San Diego & kc claffy CAIDA, UC San Diego, «Remote physical device fingerprinting» [29] Tadayoshi Kohno & Andre Broido & K.C. Claffy, «Remote physical device fingerprinting», https://homes.cs.washington.edu/~yoshi/papers/PDF/KoBrCl2005PDF-Extended-lowres.pdf [30] https://www.virtualbox.org/ consulté le 02/12/2020 [31] https://cercll.wordpress.com/2012/09/23/ubuntu-cest-quoi/ consulté le 04/12/2020 [32] https://mcfp.felk.cvut.cz/publicDatasets/IoTDatasets/ consulté le 10/09/2020 [33] https://www.stratosphereips.org/datasets-iot23 Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22th. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga. [34] https://scikit-learn.org/ [35] https://scikit-learn.org/stable/modules/preprocessing.html#preprocessing consulté le 04/12/2020 [36] https://matplotlib.org/ consulté le 03/12/2020 [37] https://mrmint.fr/overfitting-et-underfitting-quand-vos-algorithmes-de-machine-learning-derapent consulté le 04/12/2020 [38] https://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO-4.html consulté le 04/12/2020 [39] https://www.inetdoc.net/guides/iptables-tutorial/nfqueuetarget.html Consulter le 5/12/2020 [40] https://scikit-learn.org/stable/modules/generated/sklearn.metrics.mean_squared_error.html |
|