2023
DOI: 10.1007/s12083-023-01478-w
|View full text |Cite
|
Sign up to set email alerts
|

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges

Princy Victor,
Arash Habibi Lashkari,
Rongxing Lu
et al.

Abstract: During the past decade, the Internet of Things (IoT) has paved the way for the ongoing digitization of society in unique ways. Its penetration into enterprise and day-to-day lives improved the supply chain in numerous ways. Unfortunately, the profuse diversity of IoT devices has become an attractive target for malware authors who take advantage of its vulnerabilities. Accordingly, enhancing the security of IoT devices has become the primary objective of industrialists and researchers. However, most present stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(3 citation statements)
references
References 78 publications
0
3
0
Order By: Relevance
“…Also, we looked for other reviews related to Trustworthy Artificial Intelligence methods for users' physical and environmental security. We found reviews focused only on physical (for example, [17][18][19][20][21]) or environmental security (for example, [22][23][24][25][26]). These works mainly considered some subset of Artificial Intelligence methods and did not consider the trustworthy dimensions of AI.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, we looked for other reviews related to Trustworthy Artificial Intelligence methods for users' physical and environmental security. We found reviews focused only on physical (for example, [17][18][19][20][21]) or environmental security (for example, [22][23][24][25][26]). These works mainly considered some subset of Artificial Intelligence methods and did not consider the trustworthy dimensions of AI.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…A cyber attack may result in data loss, interception, or modification. The most-common attacks in these solutions are the Man In The Middle attack (MITM), stolen or guessing attacks, capture or impersonation attacks [125], zero-day attacks, malware [25], or (Distributed) Denial of Service attacks [126].…”
Section: Security Of Computer Network Usersmentioning
confidence: 99%
“…Table 1 highlights a summary of the attacks that occur in the IoT according to previous studies. Reference Attacks [12] Spoofing, Sleep deprivation, Replay, Session hijacking [13] Spyware, Trojans, Sinkhole, Spoofing, Jamming, Tag cloning, Physical tampering [14] DDoS, Botnets, Falsified sensor data, Attacks on cloud services, Physical tampering [15] DDoS, Man-in-the-Middle, Spoofing, Physical tampering, Data breach, Malware, Ransomware [16] DDoS, Man-in-the-Middle, Malware, Ransomware, Physical tampering, Data breach, Spoofing [17] Physical damage, Exhaustion attacks, Cryptanalysis, Side-channel information, Man-in-the-Middle, DoS/DDoS, Message forging [18] Physical, Malware, DoS, Man-in-the-Middle, Replication, Spoofing, Injection, Social engineering [19] DoS, Man-in-the-Middle, Malware, Physical, Password [20] DoS, Man-in-the-Middle, Physical, Malware, Botnet, Spoofing, Eavesdropping [21] DDoS, Ransomware, Industrial spying, Click fraud…”
Section: Introductionmentioning
confidence: 99%