2019
DOI: 10.1080/09720510.2019.1580907
|View full text |Cite
|
Sign up to set email alerts
|

Towards a taxonomy of cyber threats against target applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…However, the proposed taxonomy didn't consider physical and defense strategies. Narwal et al [112] characterized cyberattacks based on the sector of applications such as industrial applications, web applications, mobile devices and computer operating systems, etc. Others in [113,114] classified the attacks into active attacks and passive attacks.…”
Section: A Basics Of Attacks and Threatsmentioning
confidence: 99%
“…However, the proposed taxonomy didn't consider physical and defense strategies. Narwal et al [112] characterized cyberattacks based on the sector of applications such as industrial applications, web applications, mobile devices and computer operating systems, etc. Others in [113,114] classified the attacks into active attacks and passive attacks.…”
Section: A Basics Of Attacks and Threatsmentioning
confidence: 99%
“…In other words, IoT forensics seeks to answer the 5WH questions in the context of IoT systems and constituent layers. In addition to gathering forensic data from physical IoT devices, the forensic data can also aggregate from local networks (e.g., a firewall or a router), edge or fog nodes, cloud datacenters [2]. Inspired by this fact, IoT Forensics can be taxonomized into five main subcategories as shown in Fig.…”
Section: Iot Forensicsmentioning
confidence: 99%
“…
As IoT technology becomes an integral part of everyday life, enhancing productivity for businesses through automation, it should come as no surprise that attackers would seek to exploit these systems and the services they provide for profit. Through the Internet, attacks are capable of launching a number of diverse malicious actions such as Distributed Denial of Service (DDoS), Scanning/Probing, Keylogging, Malware proliferation, E-mail spamming, Click fraud, Phishing, Identity theft, and more [1,2]. As such, the need for reliable methods of investigation, which can be used for identification of security incidents, reconstruction of events and attribution is evident.
…”
mentioning
confidence: 99%
“…While the importance of social engineering in phishing attacks is undeniable, and e-mail messages are the most common form of it, most taxonomies are more abstract, and not enough attention is dedicated to e-mail phishing attacks particularly in them. For example, in the taxonomy of cyber threats against target applications [14], phishing attacks are mentioned only in a description of a social engineering attack. Phishing and particularly e-mail phishing attacks are not presented in this taxonomy.…”
Section: The Content Of E-mail Phishing Attack-related Taxonomiesmentioning
confidence: 99%