Optimizing the Protection of IoT Devices

Optimizing the Protection of IoT Devices

Hack In The Box Security Conference via YouTube Direct link

Evaluation Methodology

10 of 16

10 of 16

Evaluation Methodology

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Optimizing the Protection of IoT Devices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Blacklists - Why Do We Need Them?
  3. 3 Two types of Access. Ist Download
  4. 4 Two types of Access. 2nd API
  5. 5 Problem Blacklists Need to be Evaluated
  6. 6 Previous Works in Academia
  7. 7 Source Data of Real Attacks
  8. 8 AIP V1.0 Update Framework - How it generates an updates BlackLists
  9. 9 AIP Rating Functions
  10. 10 Evaluation Methodology
  11. 11 AIP Two Month Evaluation. Num of IPS
  12. 12 What We Needed To Improve
  13. 13 AIP V2.0 - Current Version Implemented Improvements
  14. 14 AIP V3.0 - Future Planned Improvements • Data analysis comparing features
  15. 15 Blacklists Need to be Evaluated Our Contributions A new algorithm for blacklists creation, the Attacker IP Prioritizer
  16. 16 Download Community Contributions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.