2023
DOI: 10.3390/s23020733
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Verification and Execution of Cyber Attack on IoT Devices

Abstract: Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are just examples in which default credentials were used to exploit thousands of devices. This raises major concerns about IoT device security. In this work, we aimed to investigate security of IoT devices through performing automatic penetratio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 38 publications
(52 reference statements)
0
2
0
Order By: Relevance
“…It also emphasizes the use of domain-specific language for scenario modeling and the integration of various cyber exercise components, aiming to automate the entire cybersecurity exercise life cycle. In their study, F. Lemjan et al [19] investigated the security vulnerabilities of Internet of Things (IoT) devices, emphasizing the need for autonomous penetration testing to address these risks. The research explores automated attack execution models for simulating attacks in cyber ranges and applies these models to autonomously test IoT device security.…”
Section: Cyber Security Scenariosmentioning
confidence: 99%
“…It also emphasizes the use of domain-specific language for scenario modeling and the integration of various cyber exercise components, aiming to automate the entire cybersecurity exercise life cycle. In their study, F. Lemjan et al [19] investigated the security vulnerabilities of Internet of Things (IoT) devices, emphasizing the need for autonomous penetration testing to address these risks. The research explores automated attack execution models for simulating attacks in cyber ranges and applies these models to autonomously test IoT device security.…”
Section: Cyber Security Scenariosmentioning
confidence: 99%
“…According to this study, devices that are currently on the market and used worldwide are vulnerable to attacks that could be detrimental to users. Faeroy, Yamin [72], who examined vulnerabilities in IoT devices, such as autonomous monitoring and tracking systems, developed an autonomous agent whose decision-making process paralleled the execution plan model (EP Model). The seven-step PTES comprising (1) pre-engagement interactions, (2) intelligence gathering, (3) threat modeling, (4) vulnerability analysis, (5) exploitation, (6) post-exploitation, and (7) reporting was used in this study.…”
Section: Penetration Testing Frameworkmentioning
confidence: 99%
“…Security assessments must be regularly performed against these devices www.ijacsa.thesai.org to prevent cyber intruders from manipulating user devices. Nevertheless, recent research [8,[70][71][72][73][77][78][79] has not offered a solution for normal users to conduct penetration testing. Given the multitude of incomprehensible steps and software to normal users, this approach requires security experts.…”
Section: A Incompetent Usermentioning
confidence: 99%
See 1 more Smart Citation
“…For this purpose, it proposes a novel encryption method called LRO-S to secure sensitive patient data and improve the safety and adaptability of medical professionals’ access to Cloud-based patient-sensitive data. The work in [ 9 ] focused on enabling penetration testing techniques in healthcare IoT devices, in an automatic and systematic manner. Finally, the work in [ 10 ] provides a rigorous and updated state-of-the-art revision of the available mechanisms for healthcare IoT devices.…”
Section: Introductionmentioning
confidence: 99%