2018
DOI: 10.1109/mcom.2018.1700685
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…Malicious code injection: In this attack, the intruder injects a malicious code to manipulate the authentic data of the authorized user [ 21 , 45 ].…”
Section: Background and Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Malicious code injection: In this attack, the intruder injects a malicious code to manipulate the authentic data of the authorized user [ 21 , 45 ].…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…Additionally, the solutions to various existing attacks in different IoT applications like smart grid, smart home, VANET (vehicular ad-hoc networks) are discussed. Additionally, the survey conducted in [ 44 , 45 , 46 ] provides different IoT attack taxonomies and countermeasures to deal with it.…”
Section: Iot Security Landscapementioning
confidence: 99%
“…In addition, Internet measurements have been utilized to find insecurely configured embedded devices [10], detect compromised IoT devices [42,46,58], and study cloud usage as well as communication security of IoT devices [54]. Motivated by these observations, we set out to study whether modern Internet-facing industrial appliances that use the OPC UA protocol capitalize on the promised increases in security.…”
Section: Related Workmentioning
confidence: 99%
“…A completely different usage of network telescopes can be found in [17]. Shaikh et al use a combination of passive and active (scanning) measurement to discover and characterize unsolicited IoT devices.…”
Section: Related Workmentioning
confidence: 99%