Главная
Study mode:
on
1
Intro
2
Blacklists - Why Do We Need Them?
3
Two types of Access. Ist Download
4
Two types of Access. 2nd API
5
Problem Blacklists Need to be Evaluated
6
Previous Works in Academia
7
Source Data of Real Attacks
8
AIP V1.0 Update Framework - How it generates an updates BlackLists
9
AIP Rating Functions
10
Evaluation Methodology
11
AIP Two Month Evaluation. Num of IPS
12
What We Needed To Improve
13
AIP V2.0 - Current Version Implemented Improvements
14
AIP V3.0 - Future Planned Improvements • Data analysis comparing features
15
Blacklists Need to be Evaluated Our Contributions A new algorithm for blacklists creation, the Attacker IP Prioritizer
16
Download Community Contributions
Description:
Explore an in-depth analysis of IP address blacklists and their effectiveness in protecting IoT devices during this conference talk from the Hack In The Box Security Conference. Delve into the limitations of current blacklist approaches, particularly for resource-constrained IoT devices and home routers. Learn about a proposed algorithm, the Attacker IP Prioritizer (AIP), designed to optimize blacklists for IoT protection. Discover a standardized methodology for evaluating blacklist efficacy. Gain insights into the challenges of maintaining effective blacklists in cloud environments and the short-lived nature of IoT malware attacks. Follow the speaker's journey as a bachelor student researcher at StratosphereIPS Lab, working on algorithmically optimizing blacklists and studying IoT traffic through honeypot implementations.

Optimizing the Protection of IoT Devices

Hack In The Box Security Conference
Add to list
0:00 / 0:00