2017
DOI: 10.1016/j.comnet.2017.09.003
|View full text |Cite
|
Sign up to set email alerts
|

The rise of ransomware and emerging security challenges in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
119
0
4

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 231 publications
(123 citation statements)
references
References 48 publications
0
119
0
4
Order By: Relevance
“…This software will run a code injection attack. The injected malicious software has a dynamic nature, and new types of attacks are constantly introduced to violate IoT components remarkably because IoT systems have a naturally large, well-connected surface [24,74]. Meanwhile, data tampering is the act of intentionally changing (deleting, changing, manipulating or editing) information via unauthorised operations.…”
Section: ) Cyber Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…This software will run a code injection attack. The injected malicious software has a dynamic nature, and new types of attacks are constantly introduced to violate IoT components remarkably because IoT systems have a naturally large, well-connected surface [24,74]. Meanwhile, data tampering is the act of intentionally changing (deleting, changing, manipulating or editing) information via unauthorised operations.…”
Section: ) Cyber Threatsmentioning
confidence: 99%
“…Consequently, detecting these malware attacks by traditional methods is difficult [262,263]. The number of emerging IoT security threats [24]., such as zero-day attacks, is continuously growing at an alarming rate [24]. For example, the Mirai botnet and its derivations are becoming an alarming threat to the security of IoT systems [7,9].…”
Section: B Learning Strategies For Effective Iot Security 1) Zero-damentioning
confidence: 99%
“…Even though previous operating system targets were essentially Windows computers, nowadays a wider range of infected equipment and OS is noticed: MacOS, IoT devices and Cellphones (Android OS) [35,41]. Previous work has been carried out knowing the signature of the ransomware on the file system that is the encryption of all victims' files.…”
Section: Introductionmentioning
confidence: 99%
“…This can be done without the intervention of the humans. The number of IoT devices is estimated to cross 225 billion within 2020 and a major share of this will be wearable devices [1]. Real world applications of IoT has been increasing and smart homes that use these devices are growing.…”
Section: Introductionmentioning
confidence: 99%
“…It is also not necessary that they will be implemented in smart homes only, even ordinary homes might have some independent smart devices [2]. The devices are also implemented in smart connected cars [3,4], smart monitoring systems [5,6], intelligent parking systems [7], and intelligent meters [8,9]. The number of cyber-attacks in the connected world are growing at an alarming rate.…”
Section: Introductionmentioning
confidence: 99%