Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM
Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of se...
- Autores:
-
Daniel Díaz López
Blanco Uribe, María
Santiago Cely, Claudia
Vega Torres, Andrés
Moreno Guataquira, Nicolás
Morón Castro, Stefany
Nespoli, Pantaleone
Gómez Mármol, Félix
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2018
- Institución:
- Escuela Colombiana de Ingeniería Julio Garavito
- Repositorio:
- Repositorio Institucional ECI
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.escuelaing.edu.co:001/1467
- Acceso en línea:
- https://repositorio.escuelaing.edu.co/handle/001/1467
https://www.hindawi.com/journals/wcmc/2018/3029638/
- Palabra clave:
- Internet de las cosas
Seguridad informática
Computer security
LOT
Internet of Things
Ciberseguridad
- Rights
- openAccess
- License
- https://creativecommons.org/licenses/by/4.0/
Summary: | Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices. |
---|