Shielding IoT against cyber-attacks: An event-based approach using SIEM
Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of se...
- Autores:
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad del Rosario
- Repositorio:
- Repositorio EdocUR - U. Rosario
- Idioma:
- eng
- OAI Identifier:
- oai:repository.urosario.edu.co:10336/26944
- Acceso en línea:
- https://doi.org/10.1155/2018/3029638
https://repository.urosario.edu.co/handle/10336/26944
- Palabra clave:
- Internet of Things
IoT devices
Security solution
- Rights
- License
- Abierto (Texto Completo)
id |
EDOCUR2_32f5cfeb69c95e993823d72ba97782ba |
---|---|
oai_identifier_str |
oai:repository.urosario.edu.co:10336/26944 |
network_acronym_str |
EDOCUR2 |
network_name_str |
Repositorio EdocUR - U. Rosario |
repository_id_str |
|
spelling |
10616957136003910f411-8f5b-492b-8a91-1d698dd3d391-18edd8cd9-5a7b-4cac-9aaf-de5d47a5cbdf-177a34d80-936c-49a0-8c71-660d387ea60b-117703836-9ec3-4bbb-8ea7-5b7a48dab169-1fada7844-c9e8-4c40-a5f3-4279016a0b16-10ee61eb2-49cd-4dd5-96f9-71775098d655-1531e6ddc-fc78-4240-a2e6-31d5578e5a28-12020-08-19T14:40:35Z2020-08-19T14:40:35Z2018-10-25Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.application/pdfhttps://doi.org/10.1155/2018/3029638ISSN: 1530-8669EISSN: 1530-8677https://repository.urosario.edu.co/handle/10336/26944engHindawiId 3029638Wireless Communications and Mobile ComputingVol. 2018Wireless Communications and Mobile Computing, ISSN:1530-8669;EISSN:1530-8677, Vol.2018 (Octubre, 2018); 18 pp. Id 3029638https://www.hindawi.com/journals/wcmc/2018/3029638/Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2Wireless Communications and Mobile Computinginstname:Universidad del Rosarioreponame:Repositorio Institucional EdocURInternet of ThingsIoT devicesSecurity solutionShielding IoT against cyber-attacks: An event-based approach using SIEMBlindaje de IoT contra ciberataques: un enfoque basado en eventos que utiliza SIEMarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Díaz López, Daniel OrlandoBlanco Uribe, MaríaSantiago Cely, ClaudiaVega Torres, AndrésMoreno Guataquira, NicolásMorón Castro, StefanyNespoli, PantaleoneGómez Mármol, Félix10336/26944oai:repository.urosario.edu.co:10336/269442021-06-03 00:50:02.808https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co |
dc.title.spa.fl_str_mv |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
dc.title.TranslatedTitle.spa.fl_str_mv |
Blindaje de IoT contra ciberataques: un enfoque basado en eventos que utiliza SIEM |
title |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
spellingShingle |
Shielding IoT against cyber-attacks: An event-based approach using SIEM Internet of Things IoT devices Security solution |
title_short |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
title_full |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
title_fullStr |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
title_full_unstemmed |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
title_sort |
Shielding IoT against cyber-attacks: An event-based approach using SIEM |
dc.subject.keyword.spa.fl_str_mv |
Internet of Things IoT devices Security solution |
topic |
Internet of Things IoT devices Security solution |
description |
Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices. |
publishDate |
2018 |
dc.date.created.spa.fl_str_mv |
2018-10-25 |
dc.date.accessioned.none.fl_str_mv |
2020-08-19T14:40:35Z |
dc.date.available.none.fl_str_mv |
2020-08-19T14:40:35Z |
dc.type.eng.fl_str_mv |
article |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.spa.spa.fl_str_mv |
Artículo |
dc.identifier.doi.none.fl_str_mv |
https://doi.org/10.1155/2018/3029638 |
dc.identifier.issn.none.fl_str_mv |
ISSN: 1530-8669 EISSN: 1530-8677 |
dc.identifier.uri.none.fl_str_mv |
https://repository.urosario.edu.co/handle/10336/26944 |
url |
https://doi.org/10.1155/2018/3029638 https://repository.urosario.edu.co/handle/10336/26944 |
identifier_str_mv |
ISSN: 1530-8669 EISSN: 1530-8677 |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.citationStartPage.none.fl_str_mv |
Id 3029638 |
dc.relation.citationTitle.none.fl_str_mv |
Wireless Communications and Mobile Computing |
dc.relation.citationVolume.none.fl_str_mv |
Vol. 2018 |
dc.relation.ispartof.spa.fl_str_mv |
Wireless Communications and Mobile Computing, ISSN:1530-8669;EISSN:1530-8677, Vol.2018 (Octubre, 2018); 18 pp. Id 3029638 |
dc.relation.uri.spa.fl_str_mv |
https://www.hindawi.com/journals/wcmc/2018/3029638/ |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.acceso.spa.fl_str_mv |
Abierto (Texto Completo) |
rights_invalid_str_mv |
Abierto (Texto Completo) http://purl.org/coar/access_right/c_abf2 |
dc.format.mimetype.none.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Hindawi |
dc.source.spa.fl_str_mv |
Wireless Communications and Mobile Computing |
institution |
Universidad del Rosario |
dc.source.instname.none.fl_str_mv |
instname:Universidad del Rosario |
dc.source.reponame.none.fl_str_mv |
reponame:Repositorio Institucional EdocUR |
repository.name.fl_str_mv |
Repositorio institucional EdocUR |
repository.mail.fl_str_mv |
edocur@urosario.edu.co |
_version_ |
1814167565008633856 |