Filters








2,653 Hits in 6.1 sec

Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

Edward Staddon, Valeria Loscri, Nathalie Mitton
2021 Applied Sciences  
To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone.  ...  By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based  ...  Need for Categorisation As stated previously, the fourth stage of cyber attacks consists of performing various attacks upon a target system.  ... 
doi:10.3390/app11167228 fatcat:otk56tjrqrd7ffcpcajea62atq

A Technical Review of Wireless security for the Internet of things: Software Defined Radio perspective [article]

Jose de Jesus Rugeles, Edward Paul Guillen, Leonardo S Cardoso
2020 arXiv   pre-print
This paper presents a review of the vulnerabilities of the wireless technologies that bear the IoT and assessing the experiences in implementing wireless attacks targeting the Internet of Things using  ...  Most attacks at this level occur due to limitations in hardware, physical exposure of devices, and heterogeneity of technologies.  ...  INTRODUCTION On September 5 and 6, 2019 a cyber-attack affected several Wikipedia sites in Europe -including Germany, France,Italy and Poland, at the same time as parts of the Middle East [1] .IoT devices  ... 
arXiv:2009.10171v1 fatcat:u77yn7fohbedtjqpqjsmnxpar4

Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure

Amir Djenna, Saad Harous, Djamel Eddine Saidouni
2021 Applied Sciences  
However, IoT-based critical infrastructures are an appealing target for cybercriminals.  ...  As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society.  ...  As more vulnerable IoT devices come online, they create a very large attack surface, which increases the potential scale and severity of massive DDoS attacks targeting critical cyber infrastructure.  ... 
doi:10.3390/app11104580 fatcat:6qkkahey2rd6jazfucx55zep4e

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports

Nickolaos Koroniotis, Nickolaos Koroniotis, Nour Moustafa, Nour Moustafa, Francesco Schiliro, Francesco Schiliro, Praveen Gauravaram, Praveen Gauravaram, Helge Janicke
2020 IEEE Access  
Various research studies [15] - [17] have demonstrated that various IoT devices are not secured properly against cyber-attacks.  ...  However, cyber-attackers can compromise IoT devices, and cause disruptions to occur, by either manipulating the input/output data of IoT devices, or by disabling them as a result of DoS attacks [195]  ... 
doi:10.1109/access.2020.3036728 fatcat:7kbdcvfwmvextpmrgo4mc2qgyq

A First Step Towards Understanding Real-world Attacks on IoT Devices [article]

Armin Ziaie Tabari, Xinming Ou
2020 arXiv   pre-print
With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them.  ...  In doing so we were able to attract increasingly sophisticated attack data. We present the design of this honeypot ecosystem and our observation on the attack data so far.  ...  The emerging of IoT devices could significantly change the landscape of cyber-attacks both in terms of motives and methods.  ... 
arXiv:2003.01218v1 fatcat:ey34gwllvngxdnvl7hzjsxdsga

Comprehensive Analysis of IoT Malware Evasion Techniques

A. Al-Marghilani
2021 Engineering, Technology & Applied Science Research  
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security.  ...  This paper presents a survey of IoT malware evasion techniques, reviewing and discussing various researches.  ...  VARIOUS MALWARE ATTACKS IN IOT In [36] , malware targeting mobile devices was explored as a considered serious threat.  ... 
doi:10.48084/etasr.4296 fatcat:hyfkdspwizce3cyeu6erygpqai

Secure Internet of Things (IoT)-based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities

Xing Liu, Cheng Qian, William G. Hatcher, Hansong Xu, Weixian Liao, Wei Yu
2019 IEEE Access  
The widespread adoption of the Internet of Things (IoT) technologies has drastically increased the breadth and depth of attack surfaces in networked systems, providing new mechanisms for the intrusion.  ...  Moreover, we provide a broad collection of attack examples upon each of the key applications.  ...  In Section IV, we present a study of cyber-attacks on IoT applications, outlining attack targets, examples, and impacts.  ... 
doi:10.1109/access.2019.2920763 fatcat:35wpzxezujcf5m6fjedlcmutny

Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review

Eklas Hossain, Imtiaj Khan, Fuad Un-Noor, Sarder Shazali Sikander, Md. Samiul Haque Sunny
2019 IEEE Access  
In the complex connected system of SG, cyber security becomes a critical issue; IoT devices and their data turning into major targets of attacks.  ...  Connectivity lies at the core of this new grid infrastructure, which is provided by the Internet of Things (IoT).  ...  The vulnerability of IoT devices to cyber-attacks rated them the most probable way of attacking both in 2016 and 2017 [191] , [192] .  ... 
doi:10.1109/access.2019.2894819 fatcat:2525icn33resjpigdjk45svyq4

The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence

Hongmei He, Carsten Maple, Tim Watson, Ashutosh Tiwari, Jorn Mehnen, Yaochu Jin, Bogdan Gabrys
2016 2016 IEEE Congress on Evolutionary Computation (CEC)  
However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems  ...  in IoT enabled cyber physical systems, and data driven cybersecurity.  ...  Since data from IoT devices or in the cloud provide various clues of cybersecurity threats, data-driven cybersecurity has great potentials for protecting IoT assets.  ... 
doi:10.1109/cec.2016.7743900 dblp:conf/cec/HeMWTMJG16 fatcat:6ghbtw2bhfbzzgycfzhtcrh3te

Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things

Petar Radanliev, David De Roure, Pete Burnap, Omar Santos
2021 The Review of Socionetwork Strategies  
This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture.  ...  self-assessment of IoT cyber risk posture.  ...  The Review of Socionetwork Strategies (2021) 15:381-411 Acknowledgements Eternal gratitude to the Fulbright Visiting Scholar Project.  ... 
doi:10.1007/s12626-021-00086-5 pmid:35506054 pmcid:PMC8297719 fatcat:av4bgvy54nctxl5w45kfo2ahoy

Security and Privacy in Smart Farming: Challenges and Opportunities

Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, Sudip Mittal
2020 IEEE Access  
Such cyber attacks have the potential to disrupt the economies of countries that are widely dependent on agriculture.  ...  Smart devices are widely used by a range of people from farmers to entrepreneurs.  ...  Leckie, Associate Professor in the School of Agriculture at Tennessee Technological University, for his domain expertise, insightful comments, and suggestions, to make this manuscript more comprehensible  ... 
doi:10.1109/access.2020.2975142 fatcat:3s7cmur2jrghzh3yxdsmklbh7m

A Survey on Security Attacks with Remote Ground Robots

Batuhan ÖZDOL, Elif KÖSELER, Ezgi ALÇİÇEK, Süha Eren CESUR, Perif Jan AYDEMİR, Şerif BAHTİYAR
2021 El-Cezeri: Journal of Science and Engineering  
One of the main contributions of the paper is to present cyber-attacks on wearable e-health devices with ground robots.  ...  In this paper, several cyber-attacks on Ehealth systems are explored. Particularly, we have focused on attacks to IoT based wearable health devices for body area networks.  ...  Therefore, E-health systems have become one of the main targets of cyber criminals, who may use ground robots to carry out cyber-attacks.  ... 
doi:10.31202/ecjse.916532 fatcat:zh6avv42cfgjjlipycjtm4x2gu

Artificial Intelligence technology in internet of Things cybersecurity

TAMEEM HEZAM
2021 figshare.com  
Cyber-attackers, on the other hand, have worked out how to abuse AI and have even startedusing adversarial AI to carry out cybersecurity assaults.  ...  The use of the Internet of Things (IoT) has exploded in recent years, and with it has come an increase in cybersecurityconcerns.  ...  ATTACKING IOT DEVICES METHODS Due to the lack of security in many IoT devices, cybercriminals have devised a variety of methods to target IoT devices from a variety of attack surfaces.  ... 
doi:10.6084/m9.figshare.14938101.v1 fatcat:togmyga2r5dpnio7rnrtp5yh6u

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
To detecting various types of cyber threats against industrial cyber physical systems, Li et al.  ...  CYBER PHYSICAL SYSTEMS Cyber physical systems process multi-source and largescale data in various domains of application.  ...  He was a recipient of the 2021 IEEE TEM BEST PAPER AWARD. His current H-index is 21, i10-index is 35  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

Leveraging Side-channel Information for Disassembly and Security

Jungmin Park, Fahim Rahman, Apostol Vassilev, Domenic Forte, Mark Tehranipoor
2019 ACM Journal on Emerging Technologies in Computing Systems  
have been increasingly targeted with a variety of cyber attacks.  ...  With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical devices, smart home appliances as well as traditional computing platforms such as personal computers and servers  ...  INTRODUCTION With the advent of the Internet of Things (IoT), embedded devices, and networked high performance computation platforms and data centers, various cyber attacks such as malware, ransomware,  ... 
pmid:32863796 pmcid:PMC7450766 fatcat:hefsx3i2hzdulhaxcj5wcvjbfm
« Previous Showing results 1 — 15 out of 2,653 results