WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Conception de filtre d'un réseau d'objets connectés par apprentissage profond


par Sandra Rochelle NYABENG MINEME
SUP'PTIC - Ingénieur de sécurité des réseaux et des systemes 2015
  

précédent sommaire

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

ANNEXES 2

Figure 45 : Partie 1 résultat du modèle d'identification des objets

Figure 46 : Partie 2 résultat du modèle d'identification des objets

ANNEXES 3

Figure 47 : Résultats des travaux d'IoT Sentinel

RÉFÉRENCES

[1] https://safeatlast.co/blog/iot-statistics/#gref consulté le 15/09/2020

[2] peut on sécuriser l'internet des objets du blogueur d'Olivier Ezratty consulté le 15/09/2020

[3] https://www.kaspersky.com/about/press-releases/2019_iot-under-fire-kaspersky-detects-more-than-100-million-attacks-on-smart-devices-in-h1-2019 consulté le 17/09/2020

[4] Pallavi Sethi and Smruti R.. Review Article «Internet of Things: Architectures, Protocols, and Applications Sarangi Department of Computer Science», IIT Delhi, New Delhi, India

[5] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung . «A MIDDLEWARE FOR THE INTERNET OF THINGS School of Computing, Engineering and Mathematics», Western Sydney University, Sydney, Australia. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 2016 DOI : 10.5121/ijcnc.2016.8214 159

[6] « Internet des objets: architectures, protocoles et applications » de Pallavi Sethi et Smruti R. Sarangi publié sur Hindawi Journal of Electrical and Computer Engineering Volume 2017, Article ID 9324035, 25 pages https://doi.org/10.1155/2017/9324035

[7]Le projet AWASP 2018 voir sur : https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf consulté le 25/10/2020

[8] Shafiq Ul Rehman et Selvakumar Manickam. « A Study of Smart Home Environment and it's Security Threats», Article  in  International Journal of Reliability Quality and Safety Engineering · May 2016 DOI: 10.1142/S021853931640005.Voir https://www.researchgate.net/publication/303089918

[9] https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/

[10] https://fullcirclemagazine.org/2016/09/04/bashlite-malware-turning-millions-of-linux-based-iot-devices-into-ddos-botnet/ consulté le 1/11/2020

[11] https://www.cyberswachhtakendra.gov.in/alerts/BrickerBot_IoT_Malware.html

[12] https://unit42.paloaltonetworks.com/muhstik-botnet-attacks-tomato-routers-to-harvest-new-iot-devices/ consulté le 16/11/2020

[13] https://unit42.paloaltonetworks.com/muhstik-botnet-exploits-the-latest-weblogic-vulnerability-for-cryptomining-and-ddos-attacks/ consulté le 16/11/2020

[14] https://labs.bitdefender.com/2018/09/hide-and-seek-iot-botnet-learns-new-tricks-uses-adb-over-internet-to-exploit-thousands-of-android-devices/

[15] https://www.malwaretech.com/2019/01/tracking-the-hide-and-seek-bonet.html#:~:text=Hide%20and%20Seek%20(HNS)%20is,well%20as%20some%20old%20CVEs. Consulté le 15/11/220

[16]Markus Miettinen, Ahmad-Reza Sadeghi, Samuel Marchal , N. Asokan, Ibbad Hafeez, Sasu Tarkoma, «IOT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT», page 1-5

[17] https://cve.mitre.org/about/faqs.html

consulté le 15/09/2020

[18] https://connect.ed-diamond.com/MISC/MISC-064/BSD-Packet-Filter

consulté le 20/09/2020

[19] Bruno Cruz , Silvana Go'mez-Meire , David Ruano-Orda's , Helge Janicke, Iryna Yevseyeva , and Jose R. Me'ndez . «A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.»

[20] https://www.agenceecofin.com/telecom/3006-78021-la-start-up-camerounaise-ndoto-concoit-un-compteur-electrique-intelligent-permettant-de-reduire-la-fraude

consulté le 15/01/2021

[21] https://www.investiraucameroun.com/entreprises/1006-12769-a-fin-avril-2019-l-electricien-camerounais-eneo-installe-environ-4000-compteurs-intelligents-dans-les-menages consulté le 15/01/2021

[22] https://cybermap.kaspersky.com/fr/stats#country=210&type=BAD&period=w consulté le 19/01/2021

[23] https://map.lookingglasscyber.com/ consulté le 19/01/2021

[24] Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer, « Analysis of Firewall Policy Rules Using Data Mining Techniques », Department of Computer Science The University of Texas at Dallas Richardson, USA, School of Computer Science, Telecommunications and Information Systems DePaul University Chicago, USA

[25] https://www.infor.uva.es/~teodoro/neuro-intro.pdf

Ben Krose & Patrick van der Smagt, «An introduction to neural network», Faculty of Mathematics Computer Science, Institute of Robotics and System Dynamics, University of Amsterdam, German Aerospace Research Establishment

[26] http://colah.github.io/posts/2015-08-Understanding-LSTMs/ consulté le 09/12/2020

[27] https://effeuillage-la-revue.fr/portfolio-item/le-fingerprinting/

[28]Tadayoshi Kohno, CSE Department, UC San Diego & Andre Broido CAIDA, UC San Diego & kc claffy CAIDA, UC San Diego, «Remote physical device fingerprinting»

[29] Tadayoshi Kohno & Andre Broido & K.C. Claffy, «Remote physical device fingerprinting»,

https://homes.cs.washington.edu/~yoshi/papers/PDF/KoBrCl2005PDF-Extended-lowres.pdf

consulté le 14/11/2020

[30] https://www.virtualbox.org/ consulté le 02/12/2020

[31] https://cercll.wordpress.com/2012/09/23/ubuntu-cest-quoi/ consulté le 04/12/2020

[32] https://mcfp.felk.cvut.cz/publicDatasets/IoTDatasets/ consulté le 10/09/2020

[33] https://www.stratosphereips.org/datasets-iot23 Stratosphere Laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22th. Agustin Parmisano, Sebastian Garcia, Maria Jose Erquiaga.

[34] https://scikit-learn.org/

[35] https://scikit-learn.org/stable/modules/preprocessing.html#preprocessing consulté le 04/12/2020

[36] https://matplotlib.org/ consulté le 03/12/2020

[37] https://mrmint.fr/overfitting-et-underfitting-quand-vos-algorithmes-de-machine-learning-derapent consulté le 04/12/2020

[38] https://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO-4.html consulté le 04/12/2020

[39] https://www.inetdoc.net/guides/iptables-tutorial/nfqueuetarget.html

Consulter le 5/12/2020

[40] https://scikit-learn.org/stable/modules/generated/sklearn.metrics.mean_squared_error.html

précédent sommaire






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Là où il n'y a pas d'espoir, nous devons l'inventer"   Albert Camus