Security Vulnerability Analysis for IoT Devices Raspberry Pi using PENTEST

被引:1
作者
Arreaga, Nestor X. [1 ,2 ]
Enriquez, Genessis M. [1 ]
Blanc, Sara [2 ]
Estrada, Rebeca [1 ]
机构
[1] ESPOL Polytech Univ, Escuela Super Politecn Litoral, Campus Gustavo Galindo Km 30-5 Via Perimetral,POB, Guayaquil, Ecuador
[2] Univ Politecn Valencia, ITACA, Camino De Vera S-N, Valencia 46022, Spain
来源
18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023 | 2023年 / 224卷
关键词
IoT; Vulnerabilities; MITM; DoS; Raspberry Pi; Backdoor;
D O I
10.1016/j.procs.2023.09.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT device security is vital due to their involvement in collecting sensitive information from our environment. This study proves that IoT devices lack a defense mechanism to identify malicious or virus-infected files, making them vulnerable to various attacks. To test this, three different attacks (Man In The Middle, Backdoor, and Denial of Service (DoS)) were performed on a Raspberry Pi device using virtual machines. A comparison was made of the time taken to execute the attacks on the Raspberry Pi device versus the same attacks on a virtual machine with the Windows 10 operating system. The study shows that the Raspberry Pi with the Raspbian operating system is breached quicker than the Windows 10 operating system since it lacks a built-in software system to detect viruses or intrusions. The attacker takes 1 second to execute the Man In The Middle and backdoor attacks, whereas it takes 60 seconds for the Denial of Service (DoS) attack. (c) 2023 The Authors. Published by Elsevier B.V.
引用
收藏
页码:223 / 230
页数:8
相关论文
共 26 条
  • [1] Al Neyadi E., 2020, 12 ANN UND RES C APP, P1
  • [2] Berg W., 2022, Mitigating http denial-of-service attacks on self-hosted web applications
  • [3] Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study
    Davis, Brittany D.
    Mason, Janelle C.
    Anwar, Mohd
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 10102 - 10110
  • [4] Gallus P., 2021, 2021 INT C MIL TECHN, P1
  • [5] Goyal P, 2017, INT CONF COMPUT INTE, P77, DOI [10.1109/CICN.2017.19, 10.1109/CICN.2017.8319360]
  • [6] Gupta H, 2015, 4 INT C RELIABILITY
  • [7] An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security
    Iqbal, Waseem
    Abbas, Haider
    Daneshmand, Mahmoud
    Rauf, Bilal
    Bangash, Yawar Abbas
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 10250 - 10276
  • [8] Kayode O, 2020, 6 IEEE VIRTUAL WORLD
  • [9] Le C, 2022, 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), P659, DOI [10.1109/AIIoT54504.2022.9817202, 10.1109/AIIOT54504.2022.9817202]
  • [10] Backdoor Learning: A Survey
    Li, Yiming
    Jiang, Yong
    Li, Zhifeng
    Xia, Shu-Tao
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (01) : 5 - 22