Skip to content

Latest commit

 

History

History
27 lines (16 loc) · 1.7 KB

logintegrity.md

File metadata and controls

27 lines (16 loc) · 1.7 KB

Intrusion Detection System

Table of contents

External Audit of the logs

  1. Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage." IEEE transactions on computers 62.2 (2011): 362-375.

    • Third Party Auditor (TPA)
  2. Mirzamohammadi, Saeed, et al. "Ditio: Trustworthy auditing of sensor activities in mobile & IoT devices." Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems. 2017.

Digital Forensics

  1. Kebande, Victor R., Nickson M. Karie, and H. S. Venter. "Adding digital forensic readiness as a security component to the IoT domain." (2018).

    • Digital Forensic Readiness (DFR)
  2. Kłos, Mateusz, and Imed El Fray. "Securing Event Logs with Blockchain for IoT." International Conference on Computer Information Systems and Industrial Management. Springer, Cham, 2020.

  3. H. N. Noura, O. Salman, A. Chehab, and R. Couturier, “DistLog: A distributed logging scheme for IoT forensics,” Ad Hoc Networks, vol. 98, p. 102061, 2020, doi: 10.1016/j.adhoc.2019.102061.

  4. H. Nguyen, R. Ivanov, L. T. X. Phan, O. Sokolsky, J. Weimer and I. Lee, "LogSafe: Secure and Scalable Data Logger for IoT Devices," 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, 2018, pp. 141-152, doi: 10.1109/IoTDI.2018.00023.

  5. M. A. B. Ahmadon, S. Yamaguchi, S. Saon and A. K. Mahamad, "On service security analysis for event log of IoT system based on data Petri net," 2017 IEEE International Symposium on Consumer Electronics (ISCE), Kuala Lumpur, 2017, pp. 4-8, doi: 10.1109/ISCE.2017.8355531.