Internet of Things
Lecture 6 - Security Attacks in IoT
Attacks against IoT
2
Image source: https://www.einfochips.com/blog/botnet-attacks-how-iot-devices-become-part-victim-of-such-attacks/
Lecture 6 - Security Attacks in IoT
IoT Botnet – DDoS attack
3
Lecture 6 - Security Attacks in IoT
Infected 65000 IoT devices in the first 20 hours
Attack Classification
4
Attacks classification
5
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Physical Attacks
6
Lecture 6 - Security Attacks in IoT
Physical Attacks
7
Lecture 6 - Security Attacks in IoT
Physical Attacks
8
Lecture 6 - Security Attacks in IoT
Physical Attacks
9
Lecture 6 - Security Attacks in IoT
Physical Attacks
10
Lecture 6 - Security Attacks in IoT
Network Attacks
11
Lecture 6 - Security Attacks in IoT
Network Attacks
12
Lecture 6 - Security Attacks in IoT
Network Attacks
13
Lecture 6 - Security Attacks in IoT
Network Attacks
14
Lecture 6 - Security Attacks in IoT
Network Attacks
15
Lecture 6 - Security Attacks in IoT
Network Attacks
16
Lecture 6 - Security Attacks in IoT
Network Attacks
17
Lecture 6 - Security Attacks in IoT
Software Attacks
18
Lecture 6 - Security Attacks in IoT
Software Attacks
19
Lecture 6 - Security Attacks in IoT
Data Attacks
20
Lecture 6 - Security Attacks in IoT
Data Attacks
21
Lecture 6 - Security Attacks in IoT
Real World Attacks
22
Botnet Attacks
23
Lecture 6 - Security Attacks in IoT
Mirai Attack
24
Lecture 6 - Security Attacks in IoT
Mirai Attack
25
Lecture 6 - Security Attacks in IoT
Mirai - Major Attacks
26
Lecture 6 - Security Attacks in IoT
Meris Botnet
27
Lecture 6 - Security Attacks in IoT
Meris Botnet
28
Lecture 6 - Security Attacks in IoT
Meris Botnet - Real World Impact
29
Lecture 6 - Security Attacks in IoT
Defending against Meris Attack
30
Lecture 6 - Security Attacks in IoT
Matrix Botnet
31
Lecture 6 - Security Attacks in IoT
Matrix Botnet
32
Lecture 6 - Security Attacks in IoT
Matrix Botnet
33
Lecture 6 - Security Attacks in IoT
Raptor Train Botnet
34
Lecture 6 - Security Attacks in IoT
Raptor Train Botnet
35
Lecture 6 - Security Attacks in IoT
Raptor Train Botnet
36
Lecture 6 - Security Attacks in IoT
Raptor Train Botnet
37
Lecture 6 - Security Attacks in IoT
Enduring Threat of Mirai
38
Lecture 6 - Security Attacks in IoT
Eleven11bot Botnet
39
Lecture 6 - Security Attacks in IoT
Eleven11bot Botnet
40
Lecture 6 - Security Attacks in IoT
AVTECH IP Camera Vulnerability
41
Lecture 6 - Security Attacks in IoT
AVTECH IP Camera Vulnerability
42
Lecture 6 - Security Attacks in IoT
GeoVision Zero-Day Exploit
43
Lecture 6 - Security Attacks in IoT
GeoVision Zero-Day Exploit
44
Lecture 6 - Security Attacks in IoT
Akira Ransomware Webcam Bypass
45
Lecture 6 - Security Attacks in IoT
Akira Ransomware Webcam Bypass
46
Lecture 6 - Security Attacks in IoT
Mars Hydro Data Exposure
47
Lecture 6 - Security Attacks in IoT
Mars Hydro Data Exposure
48
Lecture 6 - Security Attacks in IoT
Most Vulnerable IoT Device Types in 2024
49
Device Type | Percentage of Vulnerabilities |
Smart Plug | 28.66% |
Network-Attached Storage (NAS) | 17.89% |
Smart TV | 16.93% |
IP Camera | 6.33% |
Router | 4.23% |
Home Monitoring | 4.01% |
Smart Speakers | 3.54% |
Home Automation Hubs | 3.13% |
Extender | 3.08% |
DVR | 2.62% |
Common IoT Attack Vectors
50
Lecture 6 - Security Attacks in IoT
Fundamental Security Practices
51
Lecture 6 - Security Attacks in IoT
Fundamental Security Practices
52
Lecture 6 - Security Attacks in IoT
Fundamental Security Practices
53
Lecture 6 - Security Attacks in IoT
Bibliography
54
Lecture 6 - Security Attacks in IoT
Bibliography
55
Lecture 6 - Security Attacks in IoT