{"title":"An IoT Adversary Emulation prototype tool","authors":"Shady Shahin, Hassan Soubra","doi":"10.1109/ICICT55905.2022.00009","DOIUrl":null,"url":null,"abstract":"Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.","PeriodicalId":273927,"journal":{"name":"2022 5th International Conference on Information and Computer Technologies (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT55905.2022.00009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today, with the omnipresence of the Internet of Things (IoT) devices around the world, Cybersecurity threats have become a major concern. Security professionals who act as adversaries, or Red teams, play an important role in testing the security of those IoT devices. Adversary Emulation systems are one means towards identifying Cybersecurity vulnerabilities. In this paper, we review IoT malware in the literature and we propose an IoT Adversary Emulation prototype tool that covers different IoT malware techniques such as exploitation, evasion, data exfiltration and persistence. The prototype tool proposed has been tested using an IoT system composed of a router with IP cameras.