Matches in SemOpenAlex for { <https://semopenalex.org/work/W4226334533> ?p ?o ?g. }
Showing items 1 to 96 of
96
with 100 items per page.
- W4226334533 endingPage "19072" @default.
- W4226334533 startingPage "19062" @default.
- W4226334533 abstract "Data exfiltration relies primarily on network protocols for unauthorized data transfers from information systems. In addition to well-established Internet protocols (such as DNS, ICMP, or NTP, among others), adversaries can use newer protocols such as Internet of Things (IoT) protocols to inadvertently exfiltrate data. These IoT protocols are specifically designed to meet the limitations of IoT devices and networks, where minimal bandwidth usage and low power consumption are desirable. In this article, we review the suitability of IoT protocols for exfiltrating data. In particular, we focus on the Constrained Application Protocol (CoAP; version 1.0), the message queuing telemetry transport protocol (MQTT; in its versions 3.1.1 and 5.0), and the advanced message queuing protocol (AMQP; version 1.0). For each protocol, we review its specification and calculate the overhead and available space to exfiltrate data in each protocol message. In addition, we empirically measure the elapsed time to exfiltrate different amounts of data. In this regard, we develop a software tool (dubbed CHITON) to encapsulate and exfiltrate data within the IoT protocol messages. Our results show that both MQTT and AMQP outperform CoAP. Additionally, MQTT and AMQP protocols are best suited for exfiltrating data, as both are commonly used to connect to IoT cloud providers through IoT gateways and are therefore more likely to be allowed in business networks. Finally, we also provide suggestions and recommendations to detect data exfiltration in IoT protocols." @default.
- W4226334533 created "2022-05-05" @default.
- W4226334533 creator A5039062671 @default.
- W4226334533 creator A5048946273 @default.
- W4226334533 date "2022-10-01" @default.
- W4226334533 modified "2023-10-03" @default.
- W4226334533 title "Characterization and Evaluation of IoT Protocols for Data Exfiltration" @default.
- W4226334533 cites W1821496928 @default.
- W4226334533 cites W1827189246 @default.
- W4226334533 cites W1993704367 @default.
- W4226334533 cites W2011224223 @default.
- W4226334533 cites W2014051288 @default.
- W4226334533 cites W2060626729 @default.
- W4226334533 cites W2065462850 @default.
- W4226334533 cites W2074701325 @default.
- W4226334533 cites W2099137371 @default.
- W4226334533 cites W2131588610 @default.
- W4226334533 cites W2234639732 @default.
- W4226334533 cites W2310347995 @default.
- W4226334533 cites W2354520588 @default.
- W4226334533 cites W2397242782 @default.
- W4226334533 cites W2406290104 @default.
- W4226334533 cites W2737058386 @default.
- W4226334533 cites W2737879662 @default.
- W4226334533 cites W2744703251 @default.
- W4226334533 cites W2883414880 @default.
- W4226334533 cites W2941924863 @default.
- W4226334533 cites W2963379686 @default.
- W4226334533 cites W2963514896 @default.
- W4226334533 cites W2963748489 @default.
- W4226334533 cites W2976189582 @default.
- W4226334533 cites W2984900279 @default.
- W4226334533 cites W3000307855 @default.
- W4226334533 cites W3005731256 @default.
- W4226334533 cites W3015461804 @default.
- W4226334533 cites W3125734163 @default.
- W4226334533 cites W4285723871 @default.
- W4226334533 doi "https://doi.org/10.1109/jiot.2022.3163469" @default.
- W4226334533 hasPublicationYear "2022" @default.
- W4226334533 type Work @default.
- W4226334533 citedByCount "5" @default.
- W4226334533 countsByYear W42263345332022 @default.
- W4226334533 countsByYear W42263345332023 @default.
- W4226334533 crossrefType "journal-article" @default.
- W4226334533 hasAuthorship W4226334533A5039062671 @default.
- W4226334533 hasAuthorship W4226334533A5048946273 @default.
- W4226334533 hasConcept C111919701 @default.
- W4226334533 hasConcept C12269588 @default.
- W4226334533 hasConcept C132868160 @default.
- W4226334533 hasConcept C142724271 @default.
- W4226334533 hasConcept C204787440 @default.
- W4226334533 hasConcept C26324664 @default.
- W4226334533 hasConcept C2779960059 @default.
- W4226334533 hasConcept C2780385302 @default.
- W4226334533 hasConcept C31258907 @default.
- W4226334533 hasConcept C38652104 @default.
- W4226334533 hasConcept C41008148 @default.
- W4226334533 hasConcept C71924100 @default.
- W4226334533 hasConcept C79974875 @default.
- W4226334533 hasConcept C81860439 @default.
- W4226334533 hasConceptScore W4226334533C111919701 @default.
- W4226334533 hasConceptScore W4226334533C12269588 @default.
- W4226334533 hasConceptScore W4226334533C132868160 @default.
- W4226334533 hasConceptScore W4226334533C142724271 @default.
- W4226334533 hasConceptScore W4226334533C204787440 @default.
- W4226334533 hasConceptScore W4226334533C26324664 @default.
- W4226334533 hasConceptScore W4226334533C2779960059 @default.
- W4226334533 hasConceptScore W4226334533C2780385302 @default.
- W4226334533 hasConceptScore W4226334533C31258907 @default.
- W4226334533 hasConceptScore W4226334533C38652104 @default.
- W4226334533 hasConceptScore W4226334533C41008148 @default.
- W4226334533 hasConceptScore W4226334533C71924100 @default.
- W4226334533 hasConceptScore W4226334533C79974875 @default.
- W4226334533 hasConceptScore W4226334533C81860439 @default.
- W4226334533 hasFunder F4320324111 @default.
- W4226334533 hasFunder F4320326208 @default.
- W4226334533 hasIssue "19" @default.
- W4226334533 hasLocation W42263345331 @default.
- W4226334533 hasOpenAccess W4226334533 @default.
- W4226334533 hasPrimaryLocation W42263345331 @default.
- W4226334533 hasRelatedWork W2028024605 @default.
- W4226334533 hasRelatedWork W2810213141 @default.
- W4226334533 hasRelatedWork W2899771770 @default.
- W4226334533 hasRelatedWork W3096163214 @default.
- W4226334533 hasRelatedWork W3142663584 @default.
- W4226334533 hasRelatedWork W3199887909 @default.
- W4226334533 hasRelatedWork W4205213428 @default.
- W4226334533 hasRelatedWork W4205275965 @default.
- W4226334533 hasRelatedWork W4213268060 @default.
- W4226334533 hasRelatedWork W4319302717 @default.
- W4226334533 hasVolume "9" @default.
- W4226334533 isParatext "false" @default.
- W4226334533 isRetracted "false" @default.
- W4226334533 workType "article" @default.