Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University
|
|
- Darleen Walker
- 5 years ago
- Views:
Transcription
1 Data Analytics for IoT: Applications to Security and Privacy Nick Feamster Princeton University
2 Growing Market for IoT Analytics More than 25 billion devices by 2020 Each of these devices generates data. (Cows generating 200 MB of data per year!) Devices deployed in homes, industrial control systems, business, etc. 2
3 Established Companies Collecting IoT Data Google: Incorporation of data from phones, thermostats, streaming devices, etc. Amazon: Echo, Fire Phone, Fire TV, Fire TV stick Samsung: Smart TVs, Smart Things Hub Apple: Apple Watch, Car Play 3
4 Many Companies Developing Platforms for IoT Analytics Intel: Cloud Analytics Guavus, Pentaho: IoT Analytics, Smart Metering IoTivity: Platform for developing IoT devices Iobeam: Analytics for device operations (monitoring failures, etc.) Samsara: Easy sensor deployment for fleet monitoring, IT management, etc. 4
5 Applications of IoT Analytics Fault management: Identifying faults, root cause analysis of system faults Smart metering: What if scenarios for energy management, anomaly detection Predictive maintenance: predicting outages, real-time alerts, etc. Resource optimization: identifying underutilized assets, abnormal consumption patterns Asset tracking: monitor assets in real-time, trace asset use Security and breach detection: Alert operators to intrusion events and risks 5
6 Do you think concerns over data accuracy in IoT is slowing organizations ability to create solid strategies around analyzing the data? 6
7 This Talk: IoT Analytics for Security and Privacy Problem: Devices deployed with insecure software that will never be patched. Simply identifying what is connected to the network is difficult. Identifying anomalies, data leaks, etc. even more difficult: Each device is different, anomalous activities may not generate a lot of traffic. 7
8 Example: DoS Attacks on Smart House! 8
9 Empirical Study: Connect and Monitor SmartSense Multi-sensor PixStar Digital Photoframe Sharx Security IP Camera Smartthings Hub WiFi Z-Wave Laptop Gateway (Passive Monitor) Belkin WeMo Switch Nest Thermostat Ubi Smart Speaker 9
10 A Growing Security Problem Increasing number of Internet-connected IoT devices in consumer homes. Devices ship with security & privacy flaws. Cannot rely on manufacturers alone to secure software or devices 10
11 Current State of Consumer Smart Devices Many different manufacturers, small startups, novice programmers Low capability hardware, not enough for security protocols Most data goes to an online server on the cloud Even devices in the same home communicate via the cloud forgerock.com 11
12 Security Risks of IoT Devices Devices may be difficult (or impossible!) to patch Not isolated from one another (can attack one another) Not isolated from the Internet (can attack other devices on the Internet) 12
13 Approach IoT lab to collect, analyze IoT traffic Machine learning algorithms to address: Device identification: Which devices are connected to the network? Anomaly detection: Are devices behaving abnormally due to compromise? 13
14 Privacy Risks of IoT Data Leaks of private user information Leaks of what devices are being used Leaks about user activity and behavior Often do not use encryption by default URI: smart-light json:{ activity : switch_on } 14
15 Technical Challenges Richness of patterns: Heterogeneous devices; diverse traffic patterns Feature design and selection: Succinct, effective feature representations Real-time anomaly detection: Balancing time efficiency with detection accuracy. Shifts in normal behavior over time Recalibration in deployment: Deployment settings differ from testbeds 15
16 Data Analytics of Existing IoT Devices SmartSense Multi-sensor PixStar Digital Photoframe Sharx Security IP Camera Smartthings Hub WiFi Z-Wave Laptop Gateway (Passive Monitor) Belkin WeMo Switch Nest Thermostat Ubi Smart Speaker 16
17 Subproblems for Security and Privacy Analytics What devices are connected to the network? Approach: Statistical approaches to analyze network traffic patterns. What data is being leaked to the cloud? Approach: Scalable traffic monitoring. (Note: When data is encrypted, this may become more challenging!) What are devices doing? Are devices infected? Approach: Statistical network anomaly detection. (Note: Anomalies may be low volume events.) 17
18 Device Fingerprinting: What is Connected to the Network? What devices are connected to the network? (What devices, what manufacturers?) What is the device doing? (Activity recognition.) Approach: Simple traffic analysis can reveal manufacturers (e.g., DNS lookup). Spectral clustering and reveal activity patterns. For example: Spectral clustering applied to simple traffic volume can identify different activities on thermostat. 18
19 Device Fingerprinting: Network Traffic Analysis Statistical analysis of network traffic features uniquely identify devices, and their characteristic behavior Challenge: Often the features that identify a device type are not high energy (needle in a haystack!) Sensor Switch 19
20 Device Fingerprinting: Powerline Analysis Signatures in frequency spectrum on powerline can identify devices and activities. Switched mode power supplies and low-power devices are more challenging to discern. 20
21 Subproblems for Security and Privacy Analytics What devices are connected to the network? Approach: Statistical approaches to analyze network traffic patterns. What data is being leaked to the cloud? Approach: Scalable traffic monitoring. (Note: When data is encrypted, this may become more challenging!) What are devices doing? Are devices infected? Approach: Statistical network anomaly detection. (Note: Anomalies may be low volume events.) 21
22 Example: Nest Thermostat: Traffic Analysis All traffic to nest is HTTPS on port 443 and 9543 Uses TLSv1.2 and TLSv1.0 for all traffic We found some incoming weather updates containing location information of the home and weather station in the clear. Nest has fixed this bug after our report. DNS query: time.nestlabs.com, frontdoor.nest.com, log-rts01- iad01.devices.nest.net. transport01-rts04- iad01.transport.home.nest.com 22
23 Nest: Privacy Issues Fairly secure device: all outgoing personal traffic, including configuration settings and updates to the server, use HTTPS *User zip code bug has been fixed user zip code* DNS query as well as the use of the unique port 9543 clearly identifies a Nest device. 23
24 Digital Photoframe: Traffic Analysis All traffic and feeds (RSS) cleartext over HTTP port 80 All actions sent to server in HTTP GET packet Downloads radio streams in cleartext over different ports DNS queries: api.pix-star.com, iptime.pix-star.com 24
25 Photoframe: Privacy Issues User ID is in clear text when syncing account Current user activity in clear text in HTTP GET DNS queries and HTTP traffic identifies a pix-star photoframe current activity 25
26 IP Camera: Traffic Analysis All traffic over cleartext HTTP port 80, even though viewing the stream requires login password Actions are sent as HTTP GET URI strings Videos are sent as image/jpeg and image/gif in the clear FTP requests also sent in clear over port 21, and FTP data is sent in clear text over many ports above 30,000 DNS query: 26
27 IP Camera: Privacy Issues Video can be recovered from FTP data traffic by network eavesdropper DNS query, HTTP headers, and ports identify a Sharx security camera private user data 27
28 Ubi: Traffic Analysis All voice-to-text traffic sent in clear over port 80 Activities sent in clear, and radio streamed over port 80 Sensor readings are synced with server in the background over port 80 Only communication with google API used HTTPS on port 443 and port 5228 (google talk) DNS query: portal.theubi.com, mtalk.google.com, api.grooveshark.com 28
29 current state Ubi: Privacy Issues Although HTTPS is clearly available, Ubi still uses HTTP to communicate to its portal. Eavesdropper can intercept all voice chats and sensor readings to Ubi s main portal Sensor values such as sound, temperature, light, humidity can identify if the user is home and currently active in the clear can identify the user DNS query, HTTP header (UA, Host) clearly identifies Ubi device current activity 29
30 Are companies that are investing in IoT doing enough to ensure end-toend encryption of data or do you feel like they have a long way to go? 30
31 Subproblems for Security and Privacy Analytics What devices are connected to the network? Approach: Statistical approaches to analyze network traffic patterns. What data is being leaked to the cloud? Approach: Scalable traffic monitoring. (Note: When data is encrypted, this may become more challenging!) What are devices doing? Are devices infected? Approach: Statistical network anomaly detection. (Note: Anomalies may be low volume events.) 31
32 Network Traffic from Home Routers Network traffic patterns reveal usage, sometimes reveal power cycling. In some cases, could determine anomalous activity, or human behavior. 32
33 Gathering IoT Data from Powerline Capture voltage samples first 200 KHz from Powerline Sample rate of 400 khz Extract Time Domain features min, max, mean, variance, kurtosis, skewness, IQR etc. over 5 sec window Run machine learning algorithm with above tuple as features Decision Tree, Random Forest 33
34 Activity Data from Powerline Activity periods clearly visible from differences in powerline frequency. IoT data analytics can determine whether devices are active in normal or unusual ways. Detection of activities, infections, etc. likely 34
35 Conclusion: Much Left to Do! Large and growing market for IoT Analytics Security and privacy will be huge markets for IoT Analytics Devices are difficult to secure, patch, and maintain. Insecure devices will always be connected to the network. IoT devices will continue to send data to the cloud, third parties, etc. Identifying data leaks will be important. Collection of IoT data at the network gateway is a promising approach. Both network traffic and powerline information may be revealing Plenty of opportunities for new businesses, technologies in this space. Get in Touch! Nick Feamster: feamster@cs.princeton.edu 35
The Internet of Things. Steven M. Bellovin November 24,
The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)
More informationMalling U3A Computer Group. Xmas Tech gift ideas. Chris Daly 3rd December 2018
Malling U3A Computer Group Xmas Tech gift ideas Chris Daly 3rd December 2018 Tech Xmas ideas Some ideas for Tech gifts as Xmas presents. Could be for family, friends or you. Each year the cost of hardware
More informationWHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis
WHY ARMIS Top 10 Reasons To Consider Armis 1. Comprehensive Asset Discovery and Inventory A complete inventory of hardware and software is critically important. This is why so many security frameworks,
More informationOmar Alrawi. Security Evaluation of Home-based IoT Deployments
Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar
More informationCommunication Models in Internet of Things: A Survey
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 11 May 2017 ISSN (online): 2349-784X Communication Models in Internet of Things: A Survey Santosh Kulkarni Lecturer Department
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationPOWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks
POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under
More informationWith turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure
Decoding DNS data If you have a large DNS infrastructure, understanding what is happening with your real-time and historic traffic is difficult, if not impossible. Until now, the available network management
More informationBark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University
Bark: Default-Off Networking and Access Control for the IoT James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University The IoT is everywhere So are the attacks... 1. Devices easily compromised
More informationarxiv: v1 [cs.cr] 18 May 2017
A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic Noah Apthorpe Computer Science Dept. Princeton University apthorpe@cs.princeton.edu Dillon Reisman Computer Science Dept. Princeton
More informationWeb-based Attacks on Local IoT Devices. Gunes Acar Danny Huang Frank Li Arvind Narayanan Nick Feamster
Web-based Attacks on Local IoT Devices Gunes Acar Danny Huang Frank Li Arvind Narayanan Nick Feamster 1 2 3 How to reach local IoT devices? Public devices (e.g., port forwarding) Local malware Web attacks
More informationOrchestrating an OpenStack* based IoT Smart Home
Orchestrating an OpenStack* based IoT Smart Home Michael Kadera, John Geier, Dr. Yih Leong Sun Intel Open Source Technology Center 26th October, Wednesday, 17:55-18:35 *Other names and brands may be claimed
More informationCSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT
CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to
More informationTHE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS
SESSION ID: MBS-W04 THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS Nadir Izrael CTO & Co-Founder Armis, Inc. Ben Seri Head of Research Armis, Inc. Placeholder Slide: Image of spread of infection Placeholder
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationArtificial Intelligence Drives the next Generation of Internet Security
Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved. Artificial Intelligence Leads the Way Copyright
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationA SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA
A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA Who is Cisco? Convergence of Mobile, Social, Cloud, and Data Is Driving Digital Disruption Digital
More informationIPv6 Home Automation. IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel
IPv6 Home Automation IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel -1 IPv6 & the Home: good room-mates IPv6 Compelling reason: More Addresses Billions of devices, users, always-on technologies
More informationSecurity analytics: From data to action Visual and analytical approaches to detecting modern adversaries
Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development
More informationThe SD-WAN security guide
The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are
More informationWatchdata SIMachine (M2M Solution)
Watchdata SIMachine (M2M Solution) A Introduction to M2M B Introduction to SIMachine C SIMachine Product Applications Technology Evolution ~ 1950 ~ 1980 ~ 1995 ~ 1999 Computer Internet Mobile Communication
More informationExtremeWireless WiNG NX 9500
DATA SHEET ExtremeWireless WiNG NX 9500 Integrated Services Platform Series for the Private Cloud FEATURES COMPLETE VISIBILITY OF THE ENTIRE DISTRIBUTED DEPLOYMENT One point of configuration; ExtremeWireless
More informationNRENs and IoT Security: Challenges and Opportunities. Karen O Donoghue TICAL 2018 Cartagena 4 September 2018
NRENs and IoT Security: Challenges and Opportunities Karen O Donoghue TICAL 2018 Cartagena 4 September 2018 The number of IoT devices and systems connected to the Internet will be more than 5x the global
More informationNX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD
PRODUCT SPEC SHEET NX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD NX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationLibelium Cloud Hive. Technical Guide
Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data
More informationLaunch Smart Products With End-to-End Solutions You & Your Customers Can Trust
Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationP L A Y.
P L A Y https://youtu.be/4pqrjadinos 1 2 3 Multiple building 145 structures 15M Sqf office systems & lab space 58,400 housed heads $55M annual utility spend 2M connection points 50-55 megawatt hour average
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationUse Cases. E-Commerce. Enterprise
Use Cases E-Commerce Enterprise INTRODUCTION This document provides a selection of customer use cases applicable for the e-commerce sector. Each use case describes an individual challenge faced by e-commerce
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationQualys Cloud Platform
Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationSmart Homes and Cities
Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector
More informationMedigate and Palo Alto Networks Integration
Medigate and Palo Alto Networks Integration A Superior Security Solution for Connected Medical Devices Medigate and Palo Alto Networks have teamed together to deliver a best-in-class solution that addresses
More informationIJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology
ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud
More informationHigh Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions
High Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions Dave Locke IBM Software Group Trademark Statement IBM and the IBM logo are trademarks of International Business Machines
More informationRetail Stores & Restaurant Chains
Use Cases Retail Stores & Restaurant Chains Enterprise INTRODUCTION This document provides a selection of customer use cases applicable for the retail stores sector. Each use case describes an individual
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationMichigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017
1 Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 MSUFCU Contacts: Emily Fesler Collin Lochinski Judy Lynch Benjamin Maxim Andy Wardell Michigan
More informationKASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security
KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and
More informationAnalyzing Huge Data for Suspicious Traffic. Christian Landström, Airbus DS
Analyzing Huge Data for Suspicious Traffic Christian Landström, Airbus DS Topics - Overview on security infrastructure - Strategies for network defense - A look at malicious traffic incl. Demos - How Wireshark
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationCopyright 2017 Ford Motor Company, All Rights Reserved
- Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM 01 02 03 04 05 Intro Ford
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationNote. Some History 8/8/2011. TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility
TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility Steve McCanne - CTO riverbed Note This presentation is for information purposes only and is not a
More informationFlow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018
Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow
More informationAwareness Technologies Systems Security. PHONE: (888)
Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web
More informationIoT Ecosystem and Business Opportunities
IoT Ecosystem and Business Opportunities 17th May, 2017 1 Copyright 2017 Samsung. All Rights Reserved. Shivakumar Mathapathi Co-Founder & CTO Dew Mobility (Approved Vendor for Samsung) Table of Contents
More informationOPSWAT Metadefender. Superior Malware Threat Prevention and Analysis
OPSWAT Metadefender Superior Malware Threat Prevention and Analysis Agenda What is Metadefender How Metadefender Protects Metadefender Core Features Metadefender Product Family What s New in Metadefender
More informationReal-Time Insights from the Source
LATENCY LATENCY LATENCY Real-Time Insights from the Source This white paper provides an overview of edge computing, and how edge analytics will impact and improve the trucking industry. What Is Edge Computing?
More informationSecurity improvement in IOT based on Software
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationSMART LIGHTING SOLUTION
SMART LIGHTING SOLUTION PRODUCT BRIEF A sophisticated IoT solution for an efficient, cost-effective & safe lighting Global lighting represents more than 20% of the total electricity consumption. Lighting
More informationIntelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully
Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Thomas Rohrmann, Michael Probst Analytics Experience 2016, Rome #analyticsx C opyr i g ht 2016,
More informationManaging the Subscriber Experience
Managing the Subscriber Experience Steven Shalita TelcoVision 2013 October 24, 2013 Las Vegas 1 1 Service Delivery Orchestration More Important Than Ever Exponential Growth in Data & Video Traffic Personalized
More informationVoice Activated Devices
Voice Activated Devices Maryl Gearhart Pat Hom Howard Kirsch Celie Placzek Mike Safer Monty Sher Ashby Village & UCB Retirement Center December 18, 2018 Overview Why voice activated devices? Practical
More informationData Centers. Tom Anderson
Data Centers Tom Anderson Transport Clarification RPC messages can be arbitrary size Ex: ok to send a tree or a hash table Can require more than one packet sent/received We assume messages can be dropped,
More informationInternet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12
Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it
More informationCritical networking using mesh Wi-SUN technology Dr Simon Dunkley
Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements
More informationDefining Security for an AWS EKS deployment
Defining Security for an AWS EKS deployment Cloud-Native Security www.aporeto.com Defining Security for a Kubernetes Deployment Kubernetes is an open-source orchestrator for automating deployment, scaling,
More informationIntroduction to Amazon Echo and Dot
Introduction to Amazon Echo and Dot Instructors David Kirsch CCHSV Programs Director Mary O Neill CCHSV Webmaster 1 Amazon Echo $179 Release date: November 6, 2014 Dimensions: 9.3 in. x 3.3 in. x 3.3 in.
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationKODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform
& Secure Collaboration Platform by Paweł Mączka, Storware CTO Table of Contents OVERVIEW 3 WHAT IS KODO? 4 HOW IT WORKS? 5 BACKUP & RESTORE 6 TABLE OF FEATURES 8 END-TO-END ENCRYPTION FOR ANDROID DEVICES
More informationPRE-ARRIVAL DESTINATION PREPARATION
Technical Disclosure Commons Defensive Publications Series October 02, 2017 PRE-ARRIVAL DESTINATION PREPARATION Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended Citation
More informationWireless Best Kept Secret For Now
Wireless Best Kept Secret For Now IoT Event June 2014 Gilles Thonet Managing Director Europe, ZigBee Alliance 2014 ZigBee Alliance. All rights reserved. 1 ZigBee Alliance at 10 Years Who we are Open, global,
More informationFeatures: (no need for QR Code)
The Capp-Sure series brings a revolution in surveillance. Utilising a range of high-quality IP Wireless cameras, Capp-Sure provides stunning video clarity and optional Talk-Back audio over internet via
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationThe Internet of Everything
The Internet of Everything THE THIRD WAVE OF THE INTERNET & THE FUTURE OF TELECOM Vincent H. Wiemer, CPA What is the Internet of Everything (IoE)? Includes the three waves of the Internet: 1st WAVE: Home
More informationWhy Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic
Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Presented by Stephen Friedenthal, IoT Solutions Architect About Cisco Systems, Inc. San Fran Companies want to derive
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationNovember 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization. Author: Jesús Oliva Founder & Media Lead Architect
November 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization Author: Jesús Oliva Founder & Media Lead Architect Introduction It is not a surprise if we say browsers are
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationUse Cases. Transportation. Enterprise
Use Cases Transportation Enterprise INTRODUCTION This document provides a selection of customer use cases applicable for the transportation sector. Each use case describes an individual challenge faced
More informationSmart Cities & The 4th Industrial Revolution
Smart Cities & The 4th Industrial Revolution August 2nd, 2018 Tom Snyder ncriot.org @ncriot Capture IoT opportunities for our community locally, regionally, and nationally RIoT Ecosystem 6,000 Participants
More informationCS Final Exam
CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page
More informationIoT: Here or Hype? Steve Eglash Executive Director, Secure Internet of Things Project. ǀ Secure Internet of Things Project 1
IoT: Here or Hype? Steve Eglash Executive Director, Secure Internet of Things Project ǀ Secure Internet of Things Project 1 Technology Adoption and Market Growth ooze or avalanche ǀ Secure Internet of
More informationInformation-Centric IoT Platforms for City-Scale Deployments
Information-Centric IoT Platforms for City-Scale Deployments Jiachen Chen WINLAB, Rutgers University, NJ, USA Email: jiachen@winlab.rutgers.edu Dec. 2, 2016 Information-Centric IoT Platforms for City-Scale
More informationGadgets & Gizmos Connected Devices that Could Hijack Your. Network
Enjoy the Uptime. SDN offers Internet, connectivity and managed services over its 30,000 miles of fiber optics. The network touches 300+ South Dakota communities, plus connects to other regional and national
More informationNetwork Device Forensics. Digital Forensics NETS1032 Winter 2018
Network Device Forensics Digital Forensics NETS1032 Winter 2018 Risks Most data created, stored, and used by users is kept in files on computers running end user oriented operating systems like Windows,
More informationFig Data flow diagram and architecture when using the TCUP Cloud Server for PaaS for the Developers and large
base Firewall Applications / Services Internet Firewall Apps APIs RESTful Developer Gather Level 1 Apps User Customer Apps User Customer Embedded IoT s/ M2M Sensor s Hotspot Hotspot Enrich Level 2 LWM2M/
More informationIOT Accelerator. October, 2017
IOT Accelerator October, 2017 Connected Devices in 2021 28 BILLION 7.1 Billion in 2015 8,7 billion MOBILE PHONES 3.7 Billion in 2015 4,2 billion PC/TABLET/LAPTOOP/FIXED PHONES 4.6 Billion in 2015 15,3
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationVoice Operated Assistants. APCUG VTC - 11/4/17 Greg Skalka
Voice Operated Assistants APCUG VTC - 11/4/17 Greg Skalka Voice Operated Assistants Dedicated Devices Amazon Echo, Dot, Echo Plus, Show, Look Google Home, Mini, Max Augmented Devices Amazon Fire HD10 Tablet,
More informationInternet of Things. Transforming How We Live and Work. Chris Perera Senior Director, AT&T International External & Regulatory Affairs.
27 April 2016 Internet of Things Transforming How We Live and Work Chris Perera Senior Director, AT&T International External & Regulatory Affairs 2016 AT&T Intellectual Property. All rights reserved. AT&T,
More informationNGF0502 AWS Student Slides
NextGen Firewall AWS Use Cases Barracuda NextGen Firewall F Implementation Guide Architectures and Deployments Based on four use cases Edge Firewall Secure Remote Access Office to Cloud / Hybrid Cloud
More informationUser Guide LC4. Before using this product, please read the guide carefully to avoid any damage to the product.
User Guide LC4 Before using this product, please read the guide carefully to avoid any damage to the product. 1. Product Description 1.1 Packing list IP Camera User Manual Before using this product, please
More informationAnonymous Connections and Onion Routing
Anonymous Connections and Onion Routing David Goldschlag, Michael Reed, and Paul Syverson Center for High Assurance Computer Systems Naval Research Laboratory Washington, D.C. 1 Who is Talking to Whom?
More informationInternet of Things Deployment: The Evolution of M2M Connectivity
Internet of Things Deployment: The Evolution of M2M Connectivity Nebula ADVANTAGE17 10.10.2017 Jari Collin, CTO Telia Finland STORYLINE New competition requires real-time capabilities Technology layers
More informationVideo at the Edge passive delay measurements. Kathleen Nichols Pollere, Inc November 17, 2016
Video at the Edge passive delay measurements Kathleen Nichols Pollere, Inc nichols@pollere.net November 17, 2016 Talk Roadmap Netflix and YouTube network characterization delay profiles delay localization
More information