Shielding IoT against cyber-attacks: An event-based approach using SIEM

Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of se...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2018
Institución:
Universidad del Rosario
Repositorio:
Repositorio EdocUR - U. Rosario
Idioma:
eng
OAI Identifier:
oai:repository.urosario.edu.co:10336/26944
Acceso en línea:
https://doi.org/10.1155/2018/3029638
https://repository.urosario.edu.co/handle/10336/26944
Palabra clave:
Internet of Things
IoT devices
Security solution
Rights
License
Abierto (Texto Completo)
id EDOCUR2_32f5cfeb69c95e993823d72ba97782ba
oai_identifier_str oai:repository.urosario.edu.co:10336/26944
network_acronym_str EDOCUR2
network_name_str Repositorio EdocUR - U. Rosario
repository_id_str
spelling 10616957136003910f411-8f5b-492b-8a91-1d698dd3d391-18edd8cd9-5a7b-4cac-9aaf-de5d47a5cbdf-177a34d80-936c-49a0-8c71-660d387ea60b-117703836-9ec3-4bbb-8ea7-5b7a48dab169-1fada7844-c9e8-4c40-a5f3-4279016a0b16-10ee61eb2-49cd-4dd5-96f9-71775098d655-1531e6ddc-fc78-4240-a2e6-31d5578e5a28-12020-08-19T14:40:35Z2020-08-19T14:40:35Z2018-10-25Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.application/pdfhttps://doi.org/10.1155/2018/3029638ISSN: 1530-8669EISSN: 1530-8677https://repository.urosario.edu.co/handle/10336/26944engHindawiId 3029638Wireless Communications and Mobile ComputingVol. 2018Wireless Communications and Mobile Computing, ISSN:1530-8669;EISSN:1530-8677, Vol.2018 (Octubre, 2018); 18 pp. Id 3029638https://www.hindawi.com/journals/wcmc/2018/3029638/Abierto (Texto Completo)http://purl.org/coar/access_right/c_abf2Wireless Communications and Mobile Computinginstname:Universidad del Rosarioreponame:Repositorio Institucional EdocURInternet of ThingsIoT devicesSecurity solutionShielding IoT against cyber-attacks: An event-based approach using SIEMBlindaje de IoT contra ciberataques: un enfoque basado en eventos que utiliza SIEMarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Díaz López, Daniel OrlandoBlanco Uribe, MaríaSantiago Cely, ClaudiaVega Torres, AndrésMoreno Guataquira, NicolásMorón Castro, StefanyNespoli, PantaleoneGómez Mármol, Félix10336/26944oai:repository.urosario.edu.co:10336/269442021-06-03 00:50:02.808https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co
dc.title.spa.fl_str_mv Shielding IoT against cyber-attacks: An event-based approach using SIEM
dc.title.TranslatedTitle.spa.fl_str_mv Blindaje de IoT contra ciberataques: un enfoque basado en eventos que utiliza SIEM
title Shielding IoT against cyber-attacks: An event-based approach using SIEM
spellingShingle Shielding IoT against cyber-attacks: An event-based approach using SIEM
Internet of Things
IoT devices
Security solution
title_short Shielding IoT against cyber-attacks: An event-based approach using SIEM
title_full Shielding IoT against cyber-attacks: An event-based approach using SIEM
title_fullStr Shielding IoT against cyber-attacks: An event-based approach using SIEM
title_full_unstemmed Shielding IoT against cyber-attacks: An event-based approach using SIEM
title_sort Shielding IoT against cyber-attacks: An event-based approach using SIEM
dc.subject.keyword.spa.fl_str_mv Internet of Things
IoT devices
Security solution
topic Internet of Things
IoT devices
Security solution
description Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.
publishDate 2018
dc.date.created.spa.fl_str_mv 2018-10-25
dc.date.accessioned.none.fl_str_mv 2020-08-19T14:40:35Z
dc.date.available.none.fl_str_mv 2020-08-19T14:40:35Z
dc.type.eng.fl_str_mv article
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.spa.spa.fl_str_mv Artículo
dc.identifier.doi.none.fl_str_mv https://doi.org/10.1155/2018/3029638
dc.identifier.issn.none.fl_str_mv ISSN: 1530-8669
EISSN: 1530-8677
dc.identifier.uri.none.fl_str_mv https://repository.urosario.edu.co/handle/10336/26944
url https://doi.org/10.1155/2018/3029638
https://repository.urosario.edu.co/handle/10336/26944
identifier_str_mv ISSN: 1530-8669
EISSN: 1530-8677
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationStartPage.none.fl_str_mv Id 3029638
dc.relation.citationTitle.none.fl_str_mv Wireless Communications and Mobile Computing
dc.relation.citationVolume.none.fl_str_mv Vol. 2018
dc.relation.ispartof.spa.fl_str_mv Wireless Communications and Mobile Computing, ISSN:1530-8669;EISSN:1530-8677, Vol.2018 (Octubre, 2018); 18 pp. Id 3029638
dc.relation.uri.spa.fl_str_mv https://www.hindawi.com/journals/wcmc/2018/3029638/
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.acceso.spa.fl_str_mv Abierto (Texto Completo)
rights_invalid_str_mv Abierto (Texto Completo)
http://purl.org/coar/access_right/c_abf2
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Hindawi
dc.source.spa.fl_str_mv Wireless Communications and Mobile Computing
institution Universidad del Rosario
dc.source.instname.none.fl_str_mv instname:Universidad del Rosario
dc.source.reponame.none.fl_str_mv reponame:Repositorio Institucional EdocUR
repository.name.fl_str_mv Repositorio institucional EdocUR
repository.mail.fl_str_mv edocur@urosario.edu.co
_version_ 1814167565008633856