The rapid advancement of technology and the widespread adoption of digitalization have led to an increasing prevalence of interconnected devices. Despite their small physical size, possess significant computational capabilities and are now ubiquitous in both domestic and industrial environments. They are revolutionizing various sectors, including transportation safety, health management, and sports environments. These interconnected devices rely on communication technologies such as WiFi, Bluetooth, and Zigbee. They allow us to monitor health, interact with users, and navigate efficiently. In industrial settings, they optimize production and delivery plans, reducing management overhead and enhancing job security. However, this proliferation of connected devices introduces a critical concern: cybersecurity. Ensuring the confidentiality, integrity, and availability of data becomes crucial. As the attack surface expands, malicious actors target not only data security but also people’s safety. Well-known vulnerabilities include Denial-of-Service (DoS/DDoS) attacks, malware, ransomware, phishing, and Man-in-the-Middle (MitM) exploits. To counter these threats, various techniques have emerged. Intrusion Detection Systems, Intrusion Prevention Systems, firewalls, antivirus software, and even blockchain technologies play crucial roles. These systems analyze network traffic, inspect data, and apply rules to intercept malicious activities. However, vulnerabilities persist due to bugs, outdated firmware, and human error. About that, this work aims to address information security challenges. It focuses on two main objectives: Analysis of Cybersecurity Issues: Investigating major problems across different application domains, with a special emphasis on smart mobility and smart industry. Developing Detection Systems: Creating a non-invasive hardware and software solution that combines various information gathered from different TCP/IP layers. By analyzing, the system can detect anomalies indicative of cyber attacks.

Proposal of measurement-based IDSs for cybersecurity in IoT applications

AMODEI, Andrea
2024

Abstract

The rapid advancement of technology and the widespread adoption of digitalization have led to an increasing prevalence of interconnected devices. Despite their small physical size, possess significant computational capabilities and are now ubiquitous in both domestic and industrial environments. They are revolutionizing various sectors, including transportation safety, health management, and sports environments. These interconnected devices rely on communication technologies such as WiFi, Bluetooth, and Zigbee. They allow us to monitor health, interact with users, and navigate efficiently. In industrial settings, they optimize production and delivery plans, reducing management overhead and enhancing job security. However, this proliferation of connected devices introduces a critical concern: cybersecurity. Ensuring the confidentiality, integrity, and availability of data becomes crucial. As the attack surface expands, malicious actors target not only data security but also people’s safety. Well-known vulnerabilities include Denial-of-Service (DoS/DDoS) attacks, malware, ransomware, phishing, and Man-in-the-Middle (MitM) exploits. To counter these threats, various techniques have emerged. Intrusion Detection Systems, Intrusion Prevention Systems, firewalls, antivirus software, and even blockchain technologies play crucial roles. These systems analyze network traffic, inspect data, and apply rules to intercept malicious activities. However, vulnerabilities persist due to bugs, outdated firmware, and human error. About that, this work aims to address information security challenges. It focuses on two main objectives: Analysis of Cybersecurity Issues: Investigating major problems across different application domains, with a special emphasis on smart mobility and smart industry. Developing Detection Systems: Creating a non-invasive hardware and software solution that combines various information gathered from different TCP/IP layers. By analyzing, the system can detect anomalies indicative of cyber attacks.
18-lug-2024
Inglese
TOMASSO, Giuseppe
CAPRIGLIONE, Domenico
MARIGNETTI, Fabrizio
Università degli studi di Cassino
File in questo prodotto:
File Dimensione Formato  
PhD_Thesis_Amodei.pdf

accesso aperto

Dimensione 24.25 MB
Formato Adobe PDF
24.25 MB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/195444
Il codice NBN di questa tesi è URN:NBN:IT:UNICAS-195444