Attack categorisation for IoT applications in critical infrastructures, a survey
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into
Critical Infrastructure (CI) hardware and applications, the protection of not only the systems
but the citizens themselves has become paramount. To do so, specialists must be able to
gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks
against their systems, these specialists can not only gain a quick overview of what they …
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into
Critical Infrastructure (CI) hardware and applications, the protection of not only the systems
but the citizens themselves has become paramount. To do so, specialists must be able to
gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks
against their systems, these specialists can not only gain a quick overview of what they …
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.
MDPI
以上显示的是最相近的搜索结果。 查看全部搜索结果