2021
DOI: 10.1007/978-3-030-73885-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attacks on Internet of Things (IoT) Devices, Attack Vectors, and Remedies: A Position Paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…An Intrusion Detection System (IDS) serves as a security mechanism, primarily functioning at the network layer within an IoT system [8]. For optimal performance in an IoT setting, an IDS deployed swiftly evaluates and responds to data packets, comprehends data across various layers and protocols in the IoT network, and remains compatible with the diverse technologies in the IoT environment.…”
Section: Intrusion Detection System In Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…An Intrusion Detection System (IDS) serves as a security mechanism, primarily functioning at the network layer within an IoT system [8]. For optimal performance in an IoT setting, an IDS deployed swiftly evaluates and responds to data packets, comprehends data across various layers and protocols in the IoT network, and remains compatible with the diverse technologies in the IoT environment.…”
Section: Intrusion Detection System In Iotmentioning
confidence: 99%
“…Moreover, the scattered nature of the IoT, with innumerable devices linked to networks, gives hackers a larger attack surface. This raises the risk of widespread Distributed DoS attacks, in which compromised IoT devices bombard networks or services with traffic in an attempt to interfere with normal operations and cause outages [8].…”
Section: Introductionmentioning
confidence: 99%
“…One such threat is the cyber threat which refers to any situation or event that may have the potential to negatively affect an organization's operations, assets, or people by impacting Confidentiality, Integrity, and Availability (CIA) of an information system. Notably, due to the increased usage of technologies, there has been a rise in cyberattacks in both the Information Technology (IT) and Operational Technology (OT) environment (Lallie et al, 2021;Prajapati and Singh, 2022). Successful cyber-attacks, which are not addressed effectively in a timely manner, can have dire consequences ranging from financial impact to reputational loss (Leroy, 2022).…”
Section: Introductionmentioning
confidence: 99%
“…8 Tsunami, Bashlite, Mozi, and more variants of Mirai, have emerged after the source code of Mirai, and the same was exposed on the Internet in 2016. 9 Since the Mirai source code is publicly available; developers are creating new sorts of malicious code for IoT devices based on the advantages of previous IoT botnets. 10 To analyze such kinds of IoT botnet traffic the datasets UNSW_NB15 and BoT_IoT were created by the Cyber Range Lab of UNSW Canberra, Australia in 2015 and 2019 respectively.…”
mentioning
confidence: 99%