IoT Vulnerabilities and Attacks: SILEX Malware Case Study

被引:8
作者
Mukhtar, Basem Ibrahim [1 ]
Elsayed, Mahmoud Said [2 ]
Jurcut, Anca D. [2 ]
Azer, Marianne A. [1 ,3 ]
机构
[1] Nile Univ, Sch Informat Technol & Comp Sci, Cairo 12566, Egypt
[2] Univ Coll Dublin, Sch Comp Sci, Dublin D04 V1W8, Ireland
[3] Natl Telecommun Inst, Comp & Syst Dept, Cairo, Egypt
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 11期
关键词
cybersecurity; cyber-attacks; IoT; security; SILEX malware; smart homes; vulnerabilities; asymmetry; symmetry;
D O I
10.3390/sym15111978
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices' limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.
引用
收藏
页数:26
相关论文
共 29 条
[1]   Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review [J].
Abdullahi, Mujaheed ;
Baashar, Yahia ;
Alhussian, Hitham ;
Alwadain, Ayed ;
Aziz, Norshakirah ;
Capretz, Luiz Fernando ;
Abdulkadir, Said Jadid .
ELECTRONICS, 2022, 11 (02)
[2]   A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT [J].
Ahmed, Yahye Abukar ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Alharbi, Nouf ;
Saeed, Faisal ;
Ghaleb, Fuad A. ;
Ali, Ismail Mohamed .
SUSTAINABILITY, 2022, 14 (03)
[3]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[4]   Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models [J].
Almaraz-Rivera, Josue Genaro ;
Perez-Diaz, Jesus Arturo ;
Cantoral-Ceballos, Jose Antonio .
SENSORS, 2022, 22 (09)
[5]   IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges [J].
Anand, Pooja ;
Singh, Yashwant ;
Selwal, Arvind ;
Alazab, Mamoun ;
Tanwar, Sudeep ;
Kumar, Neeraj .
IEEE ACCESS, 2020, 8 (168825-168853) :168825-168853
[6]  
Anirudh M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), P11
[7]  
Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
[8]   Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap [J].
Dhirani, Lubna Luxmi ;
Armstrong, Eddie ;
Newe, Thomas .
SENSORS, 2021, 21 (11)
[9]  
El-Gendy S., 2020, P 2020 15 INT C COMP, P1, DOI [10.1109/ICCES51560.2020.9334589, DOI 10.1109/ICCES51560.2020.9334589]
[10]  
ElKashlan M., 2020, P 2020 15 INT C COMP, P1