Diego Mendez Mena’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1. Network and logical diagram from previous work, taken from Reference [4].
Figure 2. Connectivity scheme of the network simulation environment.
Figure 3. Ethereum consortium leader network scheme.
Figure 4. GNS3 network simulation.
Figure 5. (left) Snort security event alert. (right) Blockchain transactions triggered by the alert.

+7

Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things
  • Article
  • Full-text available

December 2020

·

1,082 Reads

·

22 Citations

IoT

Diego Mendez Mena

·

Security presents itself as one of the biggest threats to the enabling and the deployment of the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity attacks that targeted major internet service providers and crippled a significant portion of the entire Internet by taking advantage of faulty and ill-protected embedded devices. Many of these devices reside at home networks with user-administrators who are not familiar with network security best practices, making them easy targets for the attackers. Therefore, security solutions are needed to navigate the insecure and untrusted public networks by automating protections through affordable and accessible first-hand network information sharing. This paper proposes and implements a proof of concept (PoC) to secure Internet Service Providers (ISPs), home networks, and home-based IoT devices using blockchain technologies. The results obtained support the idea of a distributed cyber threat intelligence data sharing network capable of protecting various stakeholders.

Download

Citations (1)


... Overall, from the gathered data, it is evident that most of the cyber-attacks that targeted the validation setup are identical to cyber-attacks that targeted the cloud setup. Port scanning with tools like Nmap and Masscan, which aid in locating and interacting with open ports on a network, is a method by which cybercriminals exploit and identify open ports on a global scale 11,[42][43][44][45] . Further, Censys and Shodan, which are search engines for Internet-connected devices, can be misused by cyber attackers to find vulnerable devices, discover open ports, gather detailed device information, identify devices with default configurations, map networks, and locate misconfigured sensitive devices [45][46][47][48] . ...

Reference:

A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things

IoT