Articles with "exfiltrate data" as a keyword



Photo by campaign_creators from unsplash

Characterization and Evaluation of IoT Protocols for Data Exfiltration

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3163469

Abstract: Data exfiltration relies primarily on network protocols for unauthorized data transfers from information systems. In addition to well-established Internet protocols (such as DNS, ICMP, or NTP, among others), adversaries can use newer protocols such as… read more here.

Keywords: iot protocols; exfiltrate data; iot; protocol ... See more keywords