2018
DOI: 10.1155/2018/3029638
|View full text |Cite
|
Sign up to set email alerts
|

Shielding IoT against Cyber‐Attacks: An Event‐Based Approach Using SIEM

Abstract: Due to the growth of IoT (Internet of Things) devices in different industries and markets in recent years and considering the currently insufficient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is affected under certain circumstances. The paper at hand proposes a security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 45 publications
(18 citation statements)
references
References 43 publications
0
18
0
Order By: Relevance
“…This new paradigm aims at converting real-world objects into smart objects [2], i.e., objects that communicate via the internet to create a common infrastructure that connects human-to-human, things-to-things and human-to-things [3]. IoT has rapidly started to involve multiple fields, such as healthcare, industry, urbanism, home appliances and so forth [4], reaching not just electronic devices but also merchandising, furniture, culture, landmarks and even food and clothing [5].…”
Section: Introductionmentioning
confidence: 99%
“…This new paradigm aims at converting real-world objects into smart objects [2], i.e., objects that communicate via the internet to create a common infrastructure that connects human-to-human, things-to-things and human-to-things [3]. IoT has rapidly started to involve multiple fields, such as healthcare, industry, urbanism, home appliances and so forth [4], reaching not just electronic devices but also merchandising, furniture, culture, landmarks and even food and clothing [5].…”
Section: Introductionmentioning
confidence: 99%
“…Several proposals have arisen in the last years aiming at protecting IoT ecosystems [24]. Thus, for instance, [40] proposes a security architecture that is based on the use of security events. Such architecture relies on a multi-relation between these attack-related elements: (i) security events categories, providing information about the impact of an attack over a given IoT device; (ii) vulnerabilities, to explain the causes of the attack; and (iii) attack surfaces, yielding information on how the attack was conducted.…”
Section: State Of the Artmentioning
confidence: 99%
“…These detection tasks may conclude with the generation of Indicators of Compromise (IoC) and Indicators of Attack (IoA) that are used by BlockSIEM in the detection of an ongoing attack or to investigate a past attack sharing some common features with a known attack. External Threat Intelligence can also provide useful countermeasures for organizations to apply in the implementation of its cyber defense strategies, like Yara rules ( ), correlation rules, security policies, and statistics model [ 40 , 41 , 42 ]. Intelligence information (security feeds) delivered by an external Threat Intelligence provider is useful for BlockSIEM, as it could use them to analyze security events that exist in the blockchain and, consequently, detect IoT attacks.…”
Section: Blocksiemmentioning
confidence: 99%
“…There is an increased level of vulnerability due to developers building backdoors into an IoT device and leaving them open [14]. In addition, default passwords provided with the device are seldom changed and become vulnerable to attacks when connected to the internet without appropriate security configurations [15].…”
Section: Introductionmentioning
confidence: 99%