Securing Data in Smart Cities
NTT Group, one of the biggest information and communication technology companies in the world that encompasses NTT Data, NTT Communications and Dimension Data, believes smart cities are the natural evolution in public safety that should make full use of next-generation sensors, ultra-high definition cameras and other forward-reaching technologies. This session covers the smart city solution is built on NTT Group’s Cognitive Foundation architecture.
When Intelligent Digital Assistants ( IDAs) Turn into Insider Threat Assistants (ITAs)
Intelligent Digital Assistants (IDAs) have opened up a new world of convenience in home and work ecosystems. Waking up in the morning and finding out, with a simple question, what is your schedule or how the weather is, completing your shopping list with a simple verbal request is a game changer with good and bad outcomes. Gartner predicts that the IDA market will increase to over 2.1BN by 2020. However, it appears that as we surround ourselves with more and more IDA devices, more and more news reports are delivering stories that are raising concerns regarding the reliability and trustworthiness of such IVAs. In this presentation we will discuss the IDA core architectures and the security and privacy concerns raised by their integration into home and work environments.
IoT Device Fingerprinting - Interpreting the IoT Communication Without Deciphering It
The plethora of interconnected ‘Things’ that are flooding our everyday lives are offering features that enhance human experiences, and our lives in general. The very same devices often pose cybersecurity threats that may overshadow the benefits. A series of DDoS attacks against Dyn LLC in the fall of 2016 demonstrated how high is the security risk and revealed the tsunami effect of such attack originated by unsecure, compromised IoT devices. Current presentation will introduce our research focused on analyzing IoT network traffic generated in the NIST IoT Lab. The analysis employs statistical- and cognitive-based methods to 'fingerprint' IoT devices with dedicated functionality. We will discuss features selection, consideration of various ANN models and their selection criteria for IoT traffic analysis, and device fingerprinting using the aforementioned models. The presentation will conclude with a brief discussion of our future research focused on leveraging the IoT device fingerprinting approach to identify malicious behavior or deviations from normal behavior that may raise security concerns.
Complexity and issues dealing with integration of IoT
enabled devices in legacy systems that have long duration life cycles.
The presentation will focus on the architecture and implementation at the application level of the IoT protocol stack and propose some design principles that can assist in the effective operational use of IoT enabled devices as they are introduced into operational use. These technologies not only employ a vast number of sensors (audio, video, RF, and environmental) but also may have in- and out-of-band signaling and control of individual components using the nascent IoT technology. Security enhancements are possible and, just as importantly, data integrity and validation assures QA/QC functions required of a robust customer service. Most of these new technologies are available as vertically implemented point solutions. The products can be effectively folded into a common logical architecture for symbiotic transfer of information among the systems and subsystems to permit efficient use of resources while lowering operating costs. If implemented within a unified architecture, it may also be possible to increase the level of security, integrity and continuity of service of all applications serviced.