Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…Typically, an IoT device application layer includes local web applications, cloud-based applications, and smartphone apps that are accessible to numerous third party app markets leading to security threats [57,58]. Hence, multiple IoT malware attacks are possible and these fall under two main categories according to the way in which IoT malware infects devices: (i) by brute force attacks through a dictionary of weak usernames and passwords; (ii) by exploiting unfixed or zero-day vulnerabilities found in IoT devices [43]. With Big Data and IoT, the malware datasets could be complex and unstructured that require more dynamic and scalable visualisation and more efficient feature extraction [44].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, an IoT device application layer includes local web applications, cloud-based applications, and smartphone apps that are accessible to numerous third party app markets leading to security threats [57,58]. Hence, multiple IoT malware attacks are possible and these fall under two main categories according to the way in which IoT malware infects devices: (i) by brute force attacks through a dictionary of weak usernames and passwords; (ii) by exploiting unfixed or zero-day vulnerabilities found in IoT devices [43]. With Big Data and IoT, the malware datasets could be complex and unstructured that require more dynamic and scalable visualisation and more efficient feature extraction [44].…”
Section: Resultsmentioning
confidence: 99%
“…Rootkits, log files, password/hidden files, and processes are some of the avenues through which compromises could be analysed contextually using automatic and semiautomatic tools primarily based on the patterns exhibited by malware [42]. However, with the present Big Data scenario, such analysis becomes complex and time-consuming to undergo a comprehensive and thorough investigation of malware samples and to accurately detect and classify zero-day malware [43,44]. We propose a visualisation of malware behaviour patterns to address this problem.…”
Section: Proposed Methods Using Similarity Miningmentioning
confidence: 99%
“…In this vein, as it has been highlighted in Section V, information-hiding-capable threats and steganographic malware can become the new ingredient for the creation of even more sophisticated malware, which can endanger a variety of setups (even not unimaginable today). For instance, the authors of [191] dissected the various techniques used by the Mirai malware targeting IoT nodes. Even if not strictly related to steganography, Mirai also exploits mechanisms to hide the presence of the process, to avoid being spotted.…”
Section: Attack Trends and Research Directionsmentioning
confidence: 99%
“…This metadata may contain sensitive information, so it is essential not to have information such as a password because it would allow attackers to access resources more quickly. Attackers seek to identify credentials in the metadata using the SSRF vulnerability in the [26], [36], [37] The average password length on IoT devices is short. public frontend.…”
Section: Introductionmentioning
confidence: 99%