Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
MUD allows the IoT manufacturers themselves to publish the legitimate communication patterns of their devices, making it easier for security devices to enforce this policy, filter out non-complying traffic, and block a device in case it has been compromised.
Sep 9, 2021 · Manufacturer Usage Description (MUD) is a new, whitelist-based cybersecurity framework that was recently proposed by the IETF to cope with ...
Abstract— Manufacturer Usage Description (MUD) is a new, whitelist-based cybersecurity standard that was recently proposed.
MUD allows the IoT manufacturers themselves to publish the legitimate communication patterns of their devices, making it easier for security devices to enforce ...
In this work, we evaluate this phenomenon and show it has a high prevalence today, thus harming dramatically the MUD framework security efficiency. We then ...
MUDirect: Protecting P2P IoT Devices with MUD. 1. Avraham Shalev (Reichman ... MUD is not adequate for 78.57% of IoT devices! MUDirect. Problem 1: One MUD File ...
People also ask
Dive into the research topics of 'MUDirect: Protecting P2P IoT Devices with MUD'. Together they form a unique fingerprint. Sort by; Weight · Alphabetically ...
MUDirect: Protecting P2P IoT Devices with MUD. Y Afek, A Bremler-Barr, D Hay, A Shalev. 2021 IEEE International Conferences on Internet of Things (iThings) and ...
MUDirect: Protecting P2P IoT Devices with MUD. Y Afek, A Bremler-Barr, D Hay, A Shalev. 2021 IEEE International Conferences on Internet of Things (iThings) and ...