Perpetrate Cyber-threats using IoT Devices as Attack Vector: The ESP8266 Use Case.
Ivan VaccariSara NarteniMaurizio MongelliMaurizio AielloEnrico CambiasoPublished in: ITASEC (2021)
Keyphrases
- cyber security
- cyber attacks
- countermeasures
- cyber crime
- denial of service attacks
- security problems
- malicious attacks
- intrusion detection
- smart grid
- data corruption
- intrusion detection system
- security measures
- information security
- attack scenarios
- security issues
- management system
- security vulnerabilities
- security risks
- critical infrastructure
- mobile devices
- attack detection
- cloud computing
- big data
- ddos attacks
- computer assisted language learning
- smart objects
- buffer overflow
- feature vectors
- dos attacks
- injection attacks
- sql injection
- network security
- identity theft
- anomaly detection
- insider attacks
- wireless sensor networks
- sensor networks
- object oriented
- data management
- everyday objects
- insider threat
- lightweight
- spatial data
- cyber physical systems
- communication technologies
- security mechanisms
- security threats
- social networks