2021
DOI: 10.3390/info12040154
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review

Abstract: In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones. There are several approaches and techniques that can be used to construct attack detection models, such as machine learning, data mining, and statistical analysis. Nowadays, this technique is commonly used because … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 76 publications
(68 reference statements)
0
12
0
Order By: Relevance
“…(2016) , present a multi-layer hardware Trojan authentication architecture for IoT devices to guarantee their validity in the network. In Bahaa et al. (2021) ; Dey et al.…”
Section: Introductionmentioning
confidence: 99%
“…(2016) , present a multi-layer hardware Trojan authentication architecture for IoT devices to guarantee their validity in the network. In Bahaa et al. (2021) ; Dey et al.…”
Section: Introductionmentioning
confidence: 99%
“…The search process includes selecting the digital repositories, constructing a search string, conducting an initial search, and retrieving the first primary studies collection. Five digital repositories have been utilized in many SLRs [78]: Springer Link, Science Direct, Association for Computer Machinery (ACM), Scopus, and IEEE Xplore. Following the digital repository selection, a search string was necessary to conduct a comprehensive search and choose the related primary studies.…”
Section: Review Protocolmentioning
confidence: 99%
“…Credential access [28] Pass hash [79,82,83,117,118] Man-in-the-middle [119] Password cracking [120] Eavesdropping [78,[80][81][82]85,87,97,105,107,111,[121][122][123] Social engineering Discovery [124] Probe [100,125] Lateral/Internal spear-phishing emails Lateral movement [108] Data leakage Collection Cloud data leakage [126] Removable device C&C and Exfiltration Tunneling over protocol [3,76,79,81,92,97,111,115,[124][125][126][127][128][129][130] DOS Impact [4,82,131] Botnet [108] Software update Data fabrication In this section, the findings and analysis of Research Question 1 related to APT features are presented. APT is a hard-to-detect cyber threat group or campaign that may use familiar attacks (such as spear phishing, watering hole, appl...…”
Section: Analysis and Findings Of Research Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Dynamic analysis and extensive penetration testing are done to reveal any vulnerabilities that might be potentially exploited. However, while there has been work on developing a DevSecOps (Myrbakken 2017) models for Cloud applications (Rajasekharaiah 2021) (Kumar 2021) and IoT systems (Bahaa 2021) (Wolf 2021) there is no work in the literature on DevSecOps for MQTT specifically.…”
Section: Introductionmentioning
confidence: 99%