Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies
نویسندگان
چکیده
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to xmlns:xlink="http://www.w3.org/1999/xlink">commercial and xmlns:xlink="http://www.w3.org/1999/xlink">industrial systems. The steep growth vast adoption IoT reinforce importance sound robust cybersecurity practices during device development life cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only itself but also application field which operates. Evidently, identifying addressing every single vulnerability an arduous, impossible, task. Attack taxonomies assist classifying attacks their corresponding vulnerabilities. Security countermeasures best then be leveraged mitigate threats vulnerabilities before they emerge into catastrophic ensure overall secure operation. Therefore, this article, we provide attack taxonomy, takes consideration different layers stack, i.e., device, infrastructure, communication, service, each layer’s designated characteristics, by adversaries. Furthermore, using nine real-world incidents that had targeted deployed consumer, commercial, industrial sectors, describe exploitation procedures, attacks, impacts, potential mitigation mechanisms protection strategies. These (and many other) highlight underlying security concerns systems demonstrate impacts such connected ecosystems, while proposed taxonomy provides a systematic procedure categorize based on affected layer impact.
منابع مشابه
postnatal studies of bats (pipistrellus kuhlii and miniopterus schreibersii) & histomorphology and histochemistry studies of organs and diseases of (neurergus microspilotus and n. kaiseri)
1. to determine whether difference in birth body mass influenced growth performance in pipistrellus kuhlii we studied a total of 12 captive-born neonates. bats were assigned to two body mass groups: light birth body mass (lbw: 0.89 ± 0.05, n=8) and heavy birth body mass (hbw: 1.35 ± 0.08, n=4). heavier body mass at birth was associated with rapid postnatal growth (body mass and forearm length) ...
assessing political stability and instability in central asia and caucasus; case study, azerbaijan and kyrgyzstan
منطقه ی آسیای مرکزی وقفقاز به عنوان منطقه ای تاریخی و به دلیل دارا بودن ذخایر عظیم هیدرو کربنی از اهمیت ویژه ای برخوردار است. کشورهای این منطقه از عوامل عمده ی بی ثباتی نظیر عوامل جغرافیایی، اقتصادی، امنیتی، اجتماعی و سیاسی رنج می برند. پس از فروپاشی اتحاد جماهیر شوروی کشورهای منطقه از نعمت استقلال ناخواسته ای برخوردار شدند که مشکلات فوق را برای آن ها چندین برابر می کرد. در این روند برخی از این...
15 صفحه اولWG Attack Taxonomy
An obvious problem in this area is payload inspection of encrypted traffic: since the network-based intrusion detection system (NIDS) commonly has no access to the encryption keys, it can not decrypt the captured data and, therefore, no analysis is possible. From a network perspective it is thus hard to deal with encrypted traffic. However, more and more traffic within networks uses some form o...
متن کاملsimulation and experimental studies for prediction mineral scale formation in oil field during mixing of injection and formation water
abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...
A Computer Network Attack Taxonomy and Ontology
Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly.The authors extend a previous, initial taxonomy of computer network attackswhichforms the b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2021.3079916