Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors.
Seth BarrettBradley BoswellGokila DoraiPublished in: IOTSMS (2023)
Keyphrases
- comprehensive analysis
- attack graphs
- countermeasures
- attack graph
- security vulnerabilities
- security risks
- attack scenarios
- buffer overflow
- management system
- information security
- data corruption
- mobile devices
- multimedia content analysis
- mac protocol
- computer viruses
- security problems
- alert correlation
- feature vectors
- smart objects
- smart phones
- big data
- vector space
- low cost
- attack detection
- cyber attacks
- location information
- embedded systems
- intrusion detection
- cloud computing