Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae
{"title":"物联网:使用CTM方法对攻击进行分类","authors":"Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae","doi":"10.1145/3386723.3387876","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Internet of Things: Classification of attacks using CTM method\",\"authors\":\"Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae\",\"doi\":\"10.1145/3386723.3387876\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.\",\"PeriodicalId\":139072,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Networking, Information Systems & Security\",\"volume\":\"153 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Networking, Information Systems & Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3386723.3387876\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3386723.3387876","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things: Classification of attacks using CTM method
The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.