ИСТИНА |
Войти в систему Регистрация |
|
Интеллектуальная Система Тематического Исследования НАукометрических данных |
||
The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing distributed network attacks including DDoS and other illegal use. An analysis of existing approaches and technologies for protecting network computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An original approach is suggested that ensures the integration of lightweight protective mechanisms directly into the construction of Smart Things with the defense on the side of a telecom operator. Variants of technology implementation are considered. Key aspects and potential ways of implementation of the proposed approach are noted. Advantages and disadvantages are discussed.
№ | Имя | Описание | Имя файла | Размер | Добавлен |
---|---|---|---|---|---|
1. | Полный текст | cyberscience2018_elel_final.pdf | 592,5 КБ | 1 марта 2020 [vlad-eliseev] | |
2. | Презентация | Vladimir_CyberSecurity2018_52.pdf | 697,2 КБ | 1 марта 2020 [vlad-eliseev] |