Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

@article{AlHawawreh2019TargetedRA,
  title={Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things},
  author={Muna Sulieman Al-Hawawreh and Frank den Hartog and Elena Sitnikova},
  journal={IEEE Internet of Things Journal},
  year={2019},
  volume={6},
  pages={7137-7151}
}
Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its edge tier, where new types of devices and technologies are deployed to interoperate the legacy industrial control systems with servers and systems in the cloud, and leverage the benefits of the Internet of Things technologies. One of these novel devices is the IIoT edge gateway, which is used to connect critical physical systems with the cyber world, and to provide consistent storage, processing, and… Expand
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
TLDR
This study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature. Expand
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
TLDR
This study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature. Expand
Developing a Security Testbed for Industrial Internet of Things
TLDR
A new generic end-to-end IIoT security testbed is proposed, with a particular focus on the brownfield system and details of the testbed’s architectural design and the implementation process are provided. Expand
A threat intelligence framework for protecting smart satellite-based healthcare networks
TLDR
A ransom denial of service (RDoS) as a new threat that would exploit CoAP protocol’s vulnerabilities is presented and a real-time discovery of attacks’ network behaviours using deep learning is presented. Expand
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions
Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware toExpand
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
The Internet of Things (IoT) is evolving our society; however, the growing adoption of IoT devices in many scenarios brings security and privacy implications. Current security solutions are eitherExpand
Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks
TLDR
The experimental result confirms that the proposed Intrusion Detection Honeypot significantly improves the ransomware detection time, rate, and accuracy compared with the existing state of the art ransomware detection model. Expand
An Immunization Scheme for Ransomware
TLDR
The idea of virus immunity is used to design an immunization solution for ransomware viruses to solve the problems of traditional ransomware defense methods, which cannot meet the requirements of rapid detection and immediate prevention of new outbreaks attacks. Expand
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
TLDR
This paper utilizes deep learning techniques to extract the latent representation of a high dimension of collected data to identify malicious behavior accurately and proposes a model that performs better in detecting ransomware compared with other existing models. Expand
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
TLDR
A new data-driven IoT/IIoT dataset with the ground truth that incorporates a label feature indicating normal and attack classes, as well as a type feature indicating the sub-classes of attacks targeting IoT/ IIoT applications for multi-classification problems is proposed. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 44 REFERENCES
The rise of ransomware and emerging security challenges in the Internet of Things
TLDR
The ransomware attacks and security concerns in IoT are presented and a few credible case studies are outlined to alert people regarding how seriously IoT devices are vulnerable to threats. Expand
Out of Control : Ransomware for Industrial Control Systems
TLDR
This work develops the first known version of ransomware that targets programmable logic controllers, discusses the economic implications of such an attack, and lays out a generic framework for ICS ransomware to aid in future study and defenses. Expand
RANSOMWARE ANALYSIS: INTERNET OF THINGS (IOT) SECURITY ISSUES, CHALLENGES AND OPEN PROBLEMS INTHE CONTEXT OF WORLDWIDE SCENARIO OF SECURITY OF SYSTEMS AND MALWARE ATTACKS
India is the third highest Asian country to receive Ransomware attacks, adding that with the growth in "Internet of Things" (IoT) industry, the threat towards infections and new malware threats willExpand
Network detection of ransomware delivered by exploit kit
TLDR
A framework for the detection of malicious communication and prevention of the user data, from being encrypted by using a combination of Software Defined Networking and Certificate Authority Checker aka CAC respectively is proposed. Expand
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
TLDR
The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes in different SCADA and production subnets, and for the subsequent network propagation, and recommend a cascaded network segmentation approach, which prioritizes the security of production network devices. Expand
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
TLDR
A holistic state-of-the-art review of the research on ransomware and its detection and prevention techniques is provided and a novel ransomware taxonomy is put forward, from several perspectives. Expand
Virtualization of SCADA testbeds for cybersecurity research: A modular approach
TLDR
A novel-modular framework is proposed to replicate complex SCADA Systems entirely on a virtual simulation, which makes them very low cost and portable and demonstrates the use of the framework for cybersecurity research. Expand
HelDroid: Dissecting and Detecting Mobile Ransomware
TLDR
HelDroid is presented, a fast, efficient and fully automated approach that recognizes known and unknown scareware and ransomware samples from goodware, based on detecting the "building blocks" that are typically needed to implement a mobile ransomware application. Expand
R-Locker: Thwarting ransomware action through a honeyfile-based approach
TLDR
A novel approach intended not just to early detect ransomware but to completely thwart its action, which does not require previous training or knowledge and allows fighting against unknown, zero-day ransomware related attacks. Expand
Survey on Ransomware: A New Era of Cyber Attack
In today’s world, a most popular crime is Cybercrime. In this paper through a literature study, effect of ransomware is discussed. In this needy internet world, how crucial is to use a non-secureExpand
...
1
2
3
4
5
...