物联网漏洞和攻击:SILEX恶意软件案例研究

IF 2.2 3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Symmetry-Basel Pub Date : 2023-10-26 DOI:10.3390/sym15111978
Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer
{"title":"物联网漏洞和攻击:SILEX恶意软件案例研究","authors":"Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer","doi":"10.3390/sym15111978","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices’ limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"18 8","pages":"0"},"PeriodicalIF":2.2000,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoT Vulnerabilities and Attacks: SILEX Malware Case Study\",\"authors\":\"Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer\",\"doi\":\"10.3390/sym15111978\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices’ limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.\",\"PeriodicalId\":48874,\"journal\":{\"name\":\"Symmetry-Basel\",\"volume\":\"18 8\",\"pages\":\"0\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2023-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Symmetry-Basel\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3390/sym15111978\",\"RegionNum\":3,\"RegionCategory\":\"综合性期刊\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MULTIDISCIPLINARY SCIENCES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Symmetry-Basel","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/sym15111978","RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)正在迅速发展,预计将在未来几年发展。物联网连接了从闭路电视(CCTV)摄像头到医疗设备,从智能家电到智能汽车以及更多小工具的所有东西。通过在各个行业和部门提供更高的效率、更好的客户服务以及更有效的商品和服务,连接这些小工具正在彻底改变我们今天的生活。随着这种预期的扩张,出现了许多挑战。最近的研究将IP摄像机列为物联网攻击的第二大目标。物联网安全表现出固有的不对称性,资源受限的设备面临着拥有更多资源和时间的攻击者,从而造成了不平衡的权力动态。在网络安全中,防御者实施安全措施,而攻击者寻找对称的弱点,这是一个对称的方面。SILEX恶意软件案例突出了这种不对称性,展示了物联网设备有限的安全性如何使它们容易受到相对简单但具有破坏性的攻击。这些见解强调了强大、主动的物联网安全措施的必要性,以解决对手带来的不对称风险,并有效保护物联网生态系统。在本文中,我们介绍了物联网漏洞,它们的原因,以及如何检测它们。我们专注于SILEX,这是针对物联网的著名恶意软件之一,作为案例研究,并介绍从该恶意软件中吸取的教训。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IoT Vulnerabilities and Attacks: SILEX Malware Case Study
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices’ limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Symmetry-Basel
Symmetry-Basel MULTIDISCIPLINARY SCIENCES-
CiteScore
5.40
自引率
11.10%
发文量
2276
审稿时长
14.88 days
期刊介绍: Symmetry (ISSN 2073-8994), an international and interdisciplinary scientific journal, publishes reviews, regular research papers and short notes. Our aim is to encourage scientists to publish their experimental and theoretical research in as much detail as possible. There is no restriction on the length of the papers. Full experimental and/or methodical details must be provided, so that results can be reproduced.
期刊最新文献
The Chromatic Entropy of Linear Supertrees and Its Application Angular-Momentum Modes in a Bosonic Condensate Trapped in the Inverse-Square Potential Development of Compact Bandpass Filter Using Symmetrical Metamaterial Structures for GPS, ISM, Wi-MAX, and WLAN Applications Entanglement and Symmetry Structure of N(= 3) Quantum Oscillators with Disparate Coupling Strengths in a Common Quantum Field Bath Nuclear Shape-Phase Transitions and the Sextic Oscillator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1