1
Evaluating Effectiveness of an Embedded System Endpoint Security Technology on EDS
Michael Siegel, Gregory Falco, Keman Huang, Weilian Chu, Elizabeth Reilly, Mayukha Vadari
Evaluating Effectiveness of an Embedded System Endpoint Security - - PowerPoint PPT Presentation
Evaluating Effectiveness of an Embedded System Endpoint Security Technology on EDS Michael Siegel, Gregory Falco, Keman Huang, Weilian Chu, Elizabeth Reilly, Mayukha Vadari 1 Digitization of Industrial Sector Increased demand on
1
Michael Siegel, Gregory Falco, Keman Huang, Weilian Chu, Elizabeth Reilly, Mayukha Vadari
industry
required
between consumer & distributor
with larger system of devices
has IP address
tanks, wind turbines
& tampering
available
timestamp
allow for public access
to ssh entry through password crackers
malicious intent
memory and storage
for conventional IoT security measures
Lightweight Security Architecture Blockchain Server
router
traces of Mirai
OS
verified over blockchain
through the black/whitelist is killed
Kernel Software Blockchain Mirai
May 2018
Port software onto Windows-based devices
Dec 2017
Vestibulum congue tempus
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor.
March 2018
Run software on smart meters Develop heuristics for machine learning analysis
April 2018
Vestibulum congue tempus
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor.
Port existing software
Software updates via VPN Clustering algorithms to detect malicious IP addresses
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security