Smart City Gnosys

Smart city article details

Title Cyber Attacks Evaluation Targeting Internet Facing Iot: An Experimental Evaluation
ID_Doc 16901
Authors Thilakarathne N.N.; Weerawarna N.T.; Mahendran R.K.
Year 2022
Published Journal of Cybersecurity and Information Management, 9, 1
DOI http://dx.doi.org/10.54216/JCIM.090102
Abstract The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study. © 2022, American Scientific Publishing Group (ASPG). All rights reserved.
Author Keywords Cyber security; Cyber-attack; Honeypot; Internet security; IoT


Similar Articles


Id Similarity Authors Title Published
54315 View0.878Padilla-Gomez M.; Gamboa-Cruzado J.; Távara-Aponte S.; Núñez-Meza Á.; Amayo-Gamboa F.; Arauco-Esquivel S.Systematic Literature Review On Cybersecurity And Its Influence On Cyber Attacks Targeting Iot DevicesComputacion y Sistemas, 28, 4 (2024)
47990 View0.874Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
13217 View0.868Hussien M.S.; Sadek M.G.; Salem S.A.Caf-Iot: A Cybersecurity Assessment Framework For Iot Devices2024 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT 2024 (2024)
16928 View0.866Jain S.; Mishra V.K.Cyber Security Attacks And Internet Of Things: Role Of Artificial IntelligenceArtificial Intelligence for Cyber Security and Industry 4.0 (2025)
32899 View0.855Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
34135 View0.854Rattanalerdnusorn E.; Pattaranantakul M.; Thaenkaew P.; Vorakulpipat C.Iotdept: Detecting Security Threats And Pinpointing Anomalies In An Iot EnvironmentACM International Conference Proceeding Series (2020)
10436 View0.854Jun Y.; Craig A.; Shafik W.; Sharif L.Artificial Intelligence Application In Cybersecurity And CyberdefenseWireless Communications and Mobile Computing, 2021 (2021)
5280 View0.852Kumar Yadav R.; Karamveer K.A Survey On Iot Botnets And Their Detection ApproachesProceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022 (2022)
9199 View0.852Mazhar T.; Talpur D.B.; Shloul T.A.; Ghadi Y.Y.; Haq I.; Ullah I.; Ouahada K.; Hamam H.Analysis Of Iot Security Challenges And Its Solutions Using Artificial IntelligenceBrain Sciences, 13, 4 (2023)