A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets

被引:6
|
作者
Cruz, Bruno [1 ]
Gomez-Meire, Silvana [1 ]
Ruano-Ordas, David [1 ,2 ,3 ,4 ]
Janicke, Helge [3 ,4 ]
Yevseyeva, Iryna [3 ,4 ]
Mendez, Jose R. [1 ,2 ]
机构
[1] Univ Vigo, Dept Comp Sci, ESEI Escuela Super Ingn Informat, Edificio Politecn,Campus Univ As Lagoas S-N, Orense 32004, Spain
[2] SERGAS UVIGO, Galicia Hlth Res Inst IIS Galicia Sur, SING Res Grp, Vigo, Spain
[3] De Montfort Univ, Sch Comp Sci & Informat, Cyber Technol Inst, Gateway House 5-33, Leicester LE1 9BH, Leics, England
[4] De Montfort Univ, Fac Comp Engn & Media CEM, Leicester, Leics, England
关键词
INTERNET; THINGS; TRUST; WORMS; TOOLS; MODEL;
D O I
10.1155/2019/9067512
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices. This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support. Many manufacturers quickly created hundreds of devices implementing functionalities but neglected some critical issues pertaining to device security. This oversight gave rise to the current situation where thousands of devices remain unpatched having many security issues that manufacturers cannot address after the devices have been produced and deployed. This article presents our novel research protecting IOT devices using Berkeley Packet Filters (BPFs) and evaluates our findings with the aid of our Filter.tlk tool, which is able to facilitate the development of BPF expressions that can be executed by GNU/Linux systems with a low impact on network packet throughput.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
    Pallavi, Sode
    Narayanan, V. Anantha
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 694 - 698
  • [2] A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
    Hammad, Eman
    Farraj, Abdallah
    2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,
  • [3] IoT Security: A Layered Approach for Attacks & Defenses
    Ahemd, Mian Muhammad
    Shah, Munam Ali
    Wahid, Abdul
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 104 - 110
  • [4] AntibIoTic: Protecting IoT Devices Against DDoS Attacks
    De Donno, Michele
    Dragoni, Nicola
    Giaretta, Alberto
    Mazzara, Manuel
    PROCEEDINGS OF 5TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING FOR DEFENCE APPLICATIONS, 2018, 717 : 59 - 72
  • [5] A Method to Secure IoT Devices Against Botnet Attacks
    Shah, Trusit
    Venkatesan, Subbarayan
    INTERNET OF THINGS - ICIOT 2019, 2019, 11519 : 28 - 42
  • [6] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [7] IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    Salehi, S. Ahmad
    COMPUTERS & SECURITY, 2024, 146
  • [8] IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
    Meneghello, Francesca
    Calore, Matteo
    Zucchetto, Daniel
    Polese, Michele
    Zanella, Andrea
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8182 - 8201
  • [9] Investigating the Robustness of IoT Security Cameras against Cyber Attacks
    Trabelsi, Zouheir
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 17 - 23
  • [10] Membership Inference Attacks Against Incremental Learning in IoT Devices
    Zhang, Xianglong
    Zhang, Huanle
    Zhang, Guoming
    Yang, Yanni
    Li, Feng
    Fan, Lisheng
    Huang, Zhijian
    Cheng, Xiuzhen
    Hu, Pengfei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (05) : 4006 - 4021