Research Article
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
| Attack techniques | Mechanism | Focus | Methodology |
| Network attack vector [52, 53] | Launch the attack’s malicious payload and propagate itself | Programming errors | Protocols and network-aware processes | Application attack vector [52, 53] | Launch executable files | Open e-mail attachment | Executable files | Control system attack vector [54] | Destroy control system such as SCADA and PLC | Server Service (MS08-067), Windows Shell (MS10-046), Print Spooler Service (MS10-061), and Windows Kernel-Mode Drivers (MS10-073) | Third parties, LAN, and removable flash drives | Worm propagation [54] | Propagate worms or bots inside the network | Infection of Web server | IIS | Targeted attack (APT) [54] | Penetrate targeted system | Misplaced diversity | Weakest path | Moving target [54, 55] | Evade antivirus detection | Limit the exposure of attackers and opportunities and mitigate system resiliency | Continually shift and change over time to increase complexity and cost |
|
|