Akashdeep Bhardwaj , Salil Bharany , Ashraf Osman Ibrahim , Ahmad Almogren , Ateeq Ur Rehman , Habib Hamam
{"title":"Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics","authors":"Akashdeep Bhardwaj , Salil Bharany , Ashraf Osman Ibrahim , Ahmad Almogren , Ateeq Ur Rehman , Habib Hamam","doi":"10.1016/j.eij.2024.100513","DOIUrl":null,"url":null,"abstract":"<div><p>The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and potential vulnerabilities within the device OS, installed libraries, and applications, as well as the infrastructure involved. This comprises both identified and unforeseen risks that could potentially compromise the device’s integrity, data, logs, and hosted applications. By minimizing the extent to which the device’s components are exposed, it becomes possible to reduce the vulnerabilities inherent in the device, thereby decreasing its overall threat surface area. This research introduces an innovative framework for assessing Smart IoT cameras within the ecosystem. This framework involves the identification and categorization of webcam devices, followed by an analysis of potential threats based on various exposure indicators present within each layer. Subsequently, this information is used to determine the possible paths through which a device might be compromised, allowing for the evaluation of severity and both maturity levels. The authors present metrics that aid in reevaluating and recalibrating the security levels, considering the discovered threat surface elements. These refined metrics offer a fresh perspective on security, offering valuable insights for stakeholders who are engaged in the development, deployment, and evaluation of the security aspects of such devices.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000768/pdfft?md5=a88d28a79564d629367219812b967ee0&pid=1-s2.0-S1110866524000768-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000768","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and potential vulnerabilities within the device OS, installed libraries, and applications, as well as the infrastructure involved. This comprises both identified and unforeseen risks that could potentially compromise the device’s integrity, data, logs, and hosted applications. By minimizing the extent to which the device’s components are exposed, it becomes possible to reduce the vulnerabilities inherent in the device, thereby decreasing its overall threat surface area. This research introduces an innovative framework for assessing Smart IoT cameras within the ecosystem. This framework involves the identification and categorization of webcam devices, followed by an analysis of potential threats based on various exposure indicators present within each layer. Subsequently, this information is used to determine the possible paths through which a device might be compromised, allowing for the evaluation of severity and both maturity levels. The authors present metrics that aid in reevaluating and recalibrating the security levels, considering the discovered threat surface elements. These refined metrics offer a fresh perspective on security, offering valuable insights for stakeholders who are engaged in the development, deployment, and evaluation of the security aspects of such devices.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.