scholarly journals A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Author(s):  
Syed Ghazanfar Abbas ◽  
Shahzaib Zahid ◽  
Faisal Hussain ◽  
Ghalib A. Shah ◽  
Muhammad Husnain
2021 ◽  
Author(s):  
Syed Ghazanfar Abbas ◽  
Shahzaib Zahid ◽  
Faisal Hussain ◽  
Ghalib A. Shah ◽  
Muhammad Husnain

Abstract Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, botnet attacks are surging. The botnet attacks are not only catastrophic for IoT device users but also for the rest of the world. Therefore, there is a crucial need to identify and mitigate the possible threats in IoT devices during the design phase. Threat modelling is a technique that is used to identify the threats in the earlier stages of the system design activity. In this paper, we propose a threat modelling approach to analyze and mitigate the botnet attacks in an IoT smart home use case. The proposed methodology identifies the development-level and application-level threats in smart home use case using STRIDE and VAST threat modelling methods. Moreover, we reticulate the identified threats with botnet attacks. Finally, we propose the mitigation techniques for all identified threats including the botnet threats.


2019 ◽  
Vol 9 (14) ◽  
pp. 2891 ◽  
Author(s):  
Yi Liao ◽  
Yiqiang Sheng ◽  
Jinlin Wang

The challenging requirements of the fifth generation (5G) cellular networks motivate the need to explore the feasibility of delivering services over new network architectures. Information-Centric Networking (ICN) is an emerging and promising network to satisfy 5G requirements. The name resolution is at the heart of ICN. We focus on satisfying the delay-sensitive requirement of the Name Resolution Service (NRS) in a 5G-ICN integrated network. We aim to design a local NRS that provides a deterministic low latency name resolution service. In this paper, we propose a temporally hierarchical deployment architecture for an Enhanced Name Resolution System (ENRS) to realize deterministic latency. The ENRS quantifiably organizes the nodes into hierarchical and nested domains by latency constraints. We design demand-aware name registration and resolution schemes to achieve constant forwarding hops in order to realize local resolution and forwarding locality. We introduce a tolerable latency-based peer resolver forwarding algorithm to improve the query hit ratio. We present a proactive name binding replicas distribution approach based on temporal–spatial features to reduce the resolution latency and query traffic. The video streaming monitoring service in Smart Home is used as a typical use case to show the continuity of service guaranteed by ENRS. Analysis demonstrates that ENRS can achieve deterministic latency. Evaluation results show that the average query hit ratio of ENRS outperforms the K-NearestNeighbor-Distributed Name Resolution System (KNN-DNRS) and Random Name Resolution System (Random-NRS) with 23.2% and 18.1%, respectively. The query traffic overhead of ENRS is up to 33.3 times smaller than KNN-DNRS. ENRS can process up to 21 GB/s name resolution traffic when the user nodes are in the magnitude order of 106.


Author(s):  
Jan-Peter Nicklas ◽  
Michel Mamrot ◽  
Petra Winzer ◽  
Daniel Lichte ◽  
Stefan Marchlewitz ◽  
...  
Keyword(s):  
Use Case ◽  

Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4816
Author(s):  
Syed Ghazanfar Abbas ◽  
Ivan Vaccari ◽  
Faisal Hussain ◽  
Shahzaib Zahid ◽  
Ubaid Ullah Fayyaz ◽  
...  

Internet of things (IoT) is a technology that enables our daily life objects to connect on the Internet and to send and receive data for a meaningful purpose. In recent years, IoT has led to many revolutions in almost every sector of our society. Nevertheless, security threats to IoT devices and networks are relentlessly disruptive, because of the proliferation of Internet technologies. Phishing is one of the most prevalent threats to all Internet users, in which attackers aim to fraudulently extract sensitive information of a user or system, using fictitious emails, websites, etc. With the rapid increase in IoT devices, attackers are targeting IoT devices such as security cameras, smart cars, etc., and perpetrating phishing attacks to gain control over such vulnerable devices for malicious purposes. In recent decades, such scams have been spreading, and they have become increasingly advanced over time. By following this trend, in this paper, we propose a threat modelling approach to identify and mitigate the cyber-threats that can cause phishing attacks. We considered two significant IoT use cases, i.e., smart autonomous vehicular system and smart home. The proposed work is carried out by applying the STRIDE threat modelling approach to both use cases, to disclose all the potential threats that may cause a phishing attack. The proposed threat modelling approach can support the IoT researchers, engineers, and IoT cyber-security policymakers in securing and protecting the potential threats in IoT devices and systems in the early design stages, to ensure the secure deployment of IoT devices in critical infrastructures.


Sign in / Sign up

Export Citation Format

Share Document