Cyber-Trust: The Shield for IoT Cyber-Attacks

Nicholas KOLOKOTRONIS, Stavros SHIAELES, Emanuele BELLINI, Liza CHARALAMBOUS, Dimitris KAVALLIEROS, Olga GKOTSOPOULOU, Clement PAVUE, Alessandro BELLINI, Gohar SARGSYAN

Onderzoeksoutput: Chapterpeer review

1 Citaat (Scopus)

Samenvatting

The security problems arising from the flawed design of legacy hardware and embedded devices allow cyber-criminals to easily compromise systems and launch large-scale attacks toward critical cyber-infrastructures. The interdisciplinary approach proposed in this chapter captures different phases of such emerging attacks, before and after known or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of vulnerabilities and design flaws found in IoT devices. This intelligence information is used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimize the damage from cyber-attacks.
Originele taal-2English
TitelCyber-Trust: The Shield for IoT Cyber-Attacks
Pagina's76-93
Aantal pagina's23
DOI's
StatusPublished - 2019

Publicatie series

NaamResilience and Hybrid Threats: Security and Integrity for the Digital World
UitgeverijIOS Press

Vingerafdruk

Duik in de onderzoeksthema's van 'Cyber-Trust: The Shield for IoT Cyber-Attacks'. Samen vormen ze een unieke vingerafdruk.

Citeer dit