About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

ANTIBIOTIC 2.0: a fog-based anti-malware for internet of things

In Proceedings of 2019 Ieee European Symposium on Security and Privacy Workshops — 2019, pp. 11-20
From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Embedded Systems Engineering, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Technical University of Denmark3

The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. However, the increasing adoption of IoT devices both in industries and personal environments has exposed businesses and consumers to a number of security threats, such as Distributed Denial of Service (DDoS) attacks.

Along the way, Fog computing was born. A novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. In this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0).

In particular, we discuss the design and implementation of the system, including possible models for deployment, security assumptions, interaction among system components, and possible modes of operation.

Language: English
Publisher: IEEE
Year: 2019
Pages: 11-20
Proceedings: 2019 IEEE European Symposium on Security and Privacy
ISBN: 1728130263 , 1728130271 , 9781728130262 and 9781728130279
Types: Conference paper
DOI: 10.1109/EuroSPW.2019.00008
ORCIDs: Dragoni, Nicola

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis