Research Article

A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT

Table 2

Zero-day attacks.

Attack techniques Mechanism Focus Methodology

Network attack vector [52, 53] Launch the attack’s malicious payload and propagate itself Programming errors Protocols and network-aware processes
Application attack vector [52, 53] Launch executable files Open e-mail attachment Executable files
Control system attack vector [54] Destroy control system such as SCADA and PLC Server Service (MS08-067), Windows Shell (MS10-046), Print Spooler Service (MS10-061), and Windows Kernel-Mode Drivers (MS10-073) Third parties, LAN, and removable flash drives
Worm propagation [54] Propagate worms or bots inside the network Infection of Web server IIS
Targeted attack (APT) [54] Penetrate targeted system Misplaced diversity Weakest path
Moving target [54, 55] Evade antivirus detection Limit the exposure of attackers and opportunities and mitigate system resiliency Continually shift and change over time to increase complexity and cost