Bot detection via IoT environment

Jae Geun Moon, Jae J. Jang, Im Y. Jung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Many users do not realize whether their devices become bots or not. There are many security accidents due to malicious bots. To solve this problem, we propose a monitor system composed of IoT devices to detect bots.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1691-1692
Number of pages2
ISBN (Electronic)9781479989362
DOIs
StatePublished - 23 Nov 2015
Event17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015 - New York, United States
Duration: 24 Aug 201526 Aug 2015

Publication series

NameProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015

Conference

Conference17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015
Country/TerritoryUnited States
CityNew York
Period24/08/1526/08/15

Keywords

  • Bot Detection
  • Cyber Security
  • IoT
  • Monitor System

Fingerprint

Dive into the research topics of 'Bot detection via IoT environment'. Together they form a unique fingerprint.

Cite this