{"title":"防范物联网网络攻击","authors":"Ghazi Abdalla Abdalrahman, H. Varol","doi":"10.1109/ISDFS.2019.8757478","DOIUrl":null,"url":null,"abstract":"IoTis a network of machines that communicate with each other, making smart decisions that help people and corporations to take control of their ventures. In recent years, the prevalence of IoT devices has increased dramatically, a phenomenon that has made users more vulnerable to cyber-attacks. As IoT becomes a staple of modern life, it is now essential to take cyber security seriously if cyber-attacks are to be prevented. It is therefore necessary to enhance the security of connected devices. One of the ways in which this can be achieved is through developing a deeper understanding of the attack types and motivations. Attacks are often traced to a weak link in the security network, meaning that connected devices serve as the chief target for cyber-attackers. Hackers are active in detecting these weak links to take control of these devices' advantages. IoT faces many challenges, but it is the enormous challenges to security that should be considered the most pressing.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1980 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Defending Against Cyber-Attacks on the Internet of Things\",\"authors\":\"Ghazi Abdalla Abdalrahman, H. Varol\",\"doi\":\"10.1109/ISDFS.2019.8757478\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoTis a network of machines that communicate with each other, making smart decisions that help people and corporations to take control of their ventures. In recent years, the prevalence of IoT devices has increased dramatically, a phenomenon that has made users more vulnerable to cyber-attacks. As IoT becomes a staple of modern life, it is now essential to take cyber security seriously if cyber-attacks are to be prevented. It is therefore necessary to enhance the security of connected devices. One of the ways in which this can be achieved is through developing a deeper understanding of the attack types and motivations. Attacks are often traced to a weak link in the security network, meaning that connected devices serve as the chief target for cyber-attackers. Hackers are active in detecting these weak links to take control of these devices' advantages. IoT faces many challenges, but it is the enormous challenges to security that should be considered the most pressing.\",\"PeriodicalId\":247412,\"journal\":{\"name\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"1980 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2019.8757478\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending Against Cyber-Attacks on the Internet of Things
IoTis a network of machines that communicate with each other, making smart decisions that help people and corporations to take control of their ventures. In recent years, the prevalence of IoT devices has increased dramatically, a phenomenon that has made users more vulnerable to cyber-attacks. As IoT becomes a staple of modern life, it is now essential to take cyber security seriously if cyber-attacks are to be prevented. It is therefore necessary to enhance the security of connected devices. One of the ways in which this can be achieved is through developing a deeper understanding of the attack types and motivations. Attacks are often traced to a weak link in the security network, meaning that connected devices serve as the chief target for cyber-attackers. Hackers are active in detecting these weak links to take control of these devices' advantages. IoT faces many challenges, but it is the enormous challenges to security that should be considered the most pressing.