YoVDO

Optimizing the Protection of IoT Devices

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Data Analysis Courses Cybersecurity Courses Algorithm Optimization Courses

Course Description

Overview

Explore an in-depth analysis of IP address blacklists and their effectiveness in protecting IoT devices during this conference talk from the Hack In The Box Security Conference. Delve into the limitations of current blacklist approaches, particularly for resource-constrained IoT devices and home routers. Learn about a proposed algorithm, the Attacker IP Prioritizer (AIP), designed to optimize blacklists for IoT protection. Discover a standardized methodology for evaluating blacklist efficacy. Gain insights into the challenges of maintaining effective blacklists in cloud environments and the short-lived nature of IoT malware attacks. Follow the speaker's journey as a bachelor student researcher at StratosphereIPS Lab, working on algorithmically optimizing blacklists and studying IoT traffic through honeypot implementations.

Syllabus

Intro
Blacklists - Why Do We Need Them?
Two types of Access. Ist Download
Two types of Access. 2nd API
Problem Blacklists Need to be Evaluated
Previous Works in Academia
Source Data of Real Attacks
AIP V1.0 Update Framework - How it generates an updates BlackLists
AIP Rating Functions
Evaluation Methodology
AIP Two Month Evaluation. Num of IPS
What We Needed To Improve
AIP V2.0 - Current Version Implemented Improvements
AIP V3.0 - Future Planned Improvements • Data analysis comparing features
Blacklists Need to be Evaluated Our Contributions A new algorithm for blacklists creation, the Attacker IP Prioritizer
Download Community Contributions


Taught by

Hack In The Box Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network