TY - JOUR
T1 - Shielding IoT against cyber-attacks
T2 - An event-based approach using SIEM
AU - Diaz-López, Daniel
AU - Blanco Uribe, Maria
AU - Santiago Cely, Claudia
AU - Vega Torres, Andrés
AU - Moreno Guataquira, Nicolás
AU - Morón Castro, Stefany
AU - Nespoli, Pantaleone
AU - Gómez Mármol, Félix
PY - 2018
Y1 - 2018
N2 - Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.
AB - Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.
UR - http://downloads.hindawi.com/journals/wcmc/2018/3029638.pdf
M3 - Artículo
SP - 1
EP - 18
JO - Wireless Communications and Mobile Computing
JF - Wireless Communications and Mobile Computing
SN - 1530-8669
IS - 3029638
M1 - 3029638
ER -