2019 7th International Symposium on Digital Forensics and Security (ISDFS) 2019
DOI: 10.1109/isdfs.2019.8757478
|View full text |Cite
|
Sign up to set email alerts
|

Defending Against Cyber-Attacks on the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…This, however, leads to an increase of cyber attacks, potential platform for fraud, and vulnerability for identity theft [2]. As a result, it is crucial for security systems to be up-to-date against scams, malware (malicious software), spam, and phishing attacks [3]. Although one solution can be focusing on detection [4] and classification [5] of the cyber attacks, it will not be sufficient enough considering the fact that these attacks happen globally [6].…”
Section: Introductionmentioning
confidence: 99%
“…This, however, leads to an increase of cyber attacks, potential platform for fraud, and vulnerability for identity theft [2]. As a result, it is crucial for security systems to be up-to-date against scams, malware (malicious software), spam, and phishing attacks [3]. Although one solution can be focusing on detection [4] and classification [5] of the cyber attacks, it will not be sufficient enough considering the fact that these attacks happen globally [6].…”
Section: Introductionmentioning
confidence: 99%
“…There are different firewalls that work dissimilarly to achieve various effects. Therefore, the independent and depend variables' relationship is affected by an extraneous (control) variable [1]. In this study context, the independent variable is the firewall, and its dependent counterpart is the cyberattack.…”
Section: Methodsmentioning
confidence: 99%
“…Man in the Middle Attack occurs when traffic through a network is interrupted. This type of attack majorly occurs when the communication protocol is not secured or the attackers manage to go bypass the security, and access data that is transmitted, and access credentials of the user [1]. Code and SQL injection attacks occur when an attacker accesses a website that does not validate inputs and fill out a form or make an API call that enables passing of the malicious code rather than the expected information.…”
Section: Cyberattacks and Network Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…If a potential cyber attack is discovered, victims should conduct an initial investigation to determine whether the cyber attacks have happened and should take some precautions to prevent this from happening again [19]. So, the important methods used to prevent cyber attack will be explored in this section [20].…”
Section: Prevention Of the Cyber Attackmentioning
confidence: 99%