Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon Jun 2022

A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon

FIU Electronic Theses and Dissertations

With the recent developments of communication technologies surrounding vehicles, we witness the simultaneous availability of multiple onboard communication interfaces on vehicles. While most of the current interfaces already include Bluetooth, WiFi, and LTE, they are augmented further by IEEE 802.11p and the 5G interfaces, which will serve for safety, maintenance, and infotainment applications. However, dynamic management of interfaces depending on application needs becomes a significant issue that can be best addressed by Software Defined Networking (SDN) capabilities. While SDN-based vehicular networks have been promoted previously, none of these works deal with practical challenges. In this thesis, we propose and develop …


Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco Jun 2022

Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco

FIU Electronic Theses and Dissertations

The purpose of this thesis is to explore honeypot-based security enhancements for information systems. First, we provide a comprehensive survey of the research that has been carried out on honeypots and honeynets for Internet of Things (IoT), Industrial Internet of Things (IIoT), and Cyber-physical Systems (CPS). We provide a taxonomy and extensive analysis of the existing honeypots and honeynets, state key design factors for the state-of-the-art honeypot/honeynet research and outline open issues. Second, we propose S-Pot, a smart honeypot framework based on open-source resources. S-Pot uses enterprise and IoT honeypots to attract attackers, learns from attacks via ML classifiers, and …