Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM

Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of se...

Full description

Autores:
Daniel Díaz López
Blanco Uribe, María
Santiago Cely, Claudia
Vega Torres, Andrés
Moreno Guataquira, Nicolás
Morón Castro, Stefany
Nespoli, Pantaleone
Gómez Mármol, Félix
Tipo de recurso:
Article of investigation
Fecha de publicación:
2018
Institución:
Escuela Colombiana de Ingeniería Julio Garavito
Repositorio:
Repositorio Institucional ECI
Idioma:
eng
OAI Identifier:
oai:repositorio.escuelaing.edu.co:001/1467
Acceso en línea:
https://repositorio.escuelaing.edu.co/handle/001/1467
https://www.hindawi.com/journals/wcmc/2018/3029638/
Palabra clave:
Internet de las cosas
Seguridad informática
Computer security
LOT
Internet of Things
Ciberseguridad
Rights
openAccess
License
https://creativecommons.org/licenses/by/4.0/
Description
Summary:Due to the growth of IoT (Internet of Tings) devices in diferent industries and markets in recent years and considering the currently insufcient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is afected under certain circumstances. Te paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, diferent vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.