ACKNOWLEDGEMENTS
This work was supported in part by CNPq - Brazil-
ian National Research Council, Grant 312180/2019-5
PQ-2, Grant BRICS 2017-591 LargEWiN, and Grant
465741/2014-2 INCT in Cybersecurity, in part by
CAPES - Brazilian Higher Education Personnel Im-
provement Coordination, Grant 23038.007604/2014-
69 FORTE and Grant 88887.144009/2017-00 PRO-
BRAL, in part by the Brazilian Ministry of the Econ-
omy, Grant 005/2016 DIPLA and Grant 083/2016
ENAP, in part by the Institutional Security Office of
the Presidency of Brazil, Grant ABIN 002/2017, in
part by the Administrative Council for Economic De-
fense, Grant CADE 08700.000047/2019-14, and in
part by the General Attorney of the Union, Grant
AGU 697.935/2019.
REFERENCES
Chandel, S., Yan, M., Chen, S., Jiang, H., and Ni, T. (2019).
Threat intelligence sharing community: A counter-
measure against advanced persistent threat. IEEE
Conference on Multimedia Information Processing
and Retrieval (MIPR).
Dutra, B. V., de Alencastro, J. F., de Caldas Filho, F. L.,
e Martins, L. M. C., de Sousa Jr., R. T., and de O. Al-
buquerque, R. (2019). Hids by signature for embed-
ded devices in iot networks. V Jornadas Nacionales
de Investigaci
´
on en Ciberseguridad (JNIC).
Ferreira, H. G. C., Canedo, E. D., and de Sousa Junior, R. T.
(2013). Iot architecture to enable intercommunica-
tion through rest api and upnp using ip, zigbee and
arduino. 1st International Workshop on Internet of
Things Communications and Technologies (IoT’13).
Ferreira, H. G. C. and de Sousa Junior, R. T. (2017). Secu-
rity analysis of a proposed internet of things middle-
ware. Cluster Comput 20.
Ghafir, I., Hammoudehc, M., Prenosilb, V., LiangxiuHanc,
Hegartyc, R., Rabiec, K., and Aparicio-Navarrod, F. J.
(2018). Detection of advanced persistent threat using
machine-learning correlation analysis. Future Gener-
ation Computer Systems.
Ghafir, I. and Prenosil, V. (2014). Advanced persistent
threat attack detection: An overview. International
Journal of Advancements in Computer Networks and
Its Security– IJCNS.
Gonc¸alves, D. G. V., de Caldas Filho, F. L., e Martins, L.
M. C., de O. Kfouri, G., Dutra, B. V., de O. Albu-
querque, R., and de Sousa Jr., R. T. (2019). Ips ar-
chitecture for iot networks overlapped in sdn. Work-
shop on Communication Networks and Power Systems
(WCNPS).
Hua, J., Liu, C., Kalbarczyk, T., Wright, C., Roman, G.-C.,
and Julien, C. (2019). riot: Enabling seamless context-
aware automation in the internet of things. IEEE 16th
International Conference on Mobile Ad Hoc and Sen-
sor Systems (MASS).
Kalita, H. K. and Kar, A. (2009). Wireless sensor network
security analysis. International journal of computer
science & information Technology (IJCSIT).
Koupaei, A. N. A. and Nazarov, A. N. (2020). Security
analysis threats, attacks, mitigations and its impact on
the internet of things (iot). Synchroinfo Journal.
Kumar, D., Shen, K., Case, B., Garg, D., Alperovich, G.,
Kuznetsov, D., Gupta, R., and Durumeric, Z. (2019).
All things considered:an analysis of iot devices on
home networks. 28th USENIX Security Symposium.
Lee, S., Jo, J.-Y., and Kim, Y. (2017). Authentication sys-
tem for stateless restful web service. Journal of Com-
putational Methods in Sciences and Engineering.
Pacheco, J., Benitez, V., F
´
elix-Herr
´
an, L., and Satam, P.
(2020). Artificial neural networks-based intrusion de-
tection system for internet of things fog nodes. IEEE
Access.
Pacheco, J. and Hariri, S. (2016). Iot security framework
for smart cyber infrastructures. IEEE 1st International
Workshops on Foundations and Applications of Self-*
Systems.
Pacheco, J., Ibarra, D., Vijay, A., and Hariri, S. (2017).
Iot security framework for smart water system.
IEEE/ACS 14th International Conference on Com-
puter Systems and Applications.
Pacheco, J., Tunc, C., and Hariri, S. (2018). Security frame-
work for iot cloud services. IEEE/ACS 15th Interna-
tional Conference on Computer Systems and Applica-
tions (AICCSA).
Rana, K., Singh, A. V., and Vijaya, P. (2018). A systematic
review on different security framework for iot. Fifth
International Symposium on Innovation in Informa-
tion and Communication Technology (ISIICT).
Vaishnavi, S. and Sethukarasi, T. (2020). Sybilwatch: a
novel approach to detect sybil attack in iot based
smarthealth care. Journal of Ambient Intelligence and
Humanized Computing.
Yang, L.-X., Huang, K., Yang, X., Zhang, Y., Xiang, Y., and
Tang, Y. Y. (2020). Defense against advanced persis-
tent threat through data backup and recovery. IEEE
Transactions on Network Science and Engineering.
Zhang, Q., Li, H., and Hu, J. (2018). A study on secu-
rity framework against advanced persistent threat. 7th
IEEE International Conference on Electronics Infor-
mation and Emergency Communication.
Zou, Q., Sun, X., Liu, P., and Singhal, A. (2020). An
approachfor detection ofadvanced persistent threat at-
tacks. THE IEEE COMPUTER SOCIETY.
ICE-B 2021 - 18th International Conference on e-Business
164