Wireless Communications and Mobile Computing / 2018 / Article / Tab 2

Research Article

Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM

Table 2

Correlation rules for different attacks scenarios implemented in OSSIM.

Scenario Rule nameReliabilityTimeout [sec]OccSecurity eventUser dataVulnerability exploitedAttack surface related

1IoT GeoFencing Directive8None1Device Access eventGE1Denial of ServiceDevice physical interface

2IoT rule1None1Authentication Exception eventBF1Username enumeration, Use of weak passwords, Account lockout or two-factor authenticationAdministrative interface, Device web interface, Cloud interface and Mobile application
Brute Attack355

3IoT Command injection3None1Command Injection Exceptions eventAE1Encryption mechanisms impl. fails, Remote update is done without security controls or Storage location is writableDevice network services and Update mechanism

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.