Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things

@article{AlHawawreh2019TargetedRA,
  title={Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things},
  author={Muna Al-Hawawreh and Frank den Hartog and E. Sitnikova},
  journal={IEEE Internet of Things Journal},
  year={2019},
  volume={6},
  pages={7137-7151}
}
  • Muna Al-Hawawreh, Frank den Hartog, E. Sitnikova
  • Published 2019
  • Computer Science
  • IEEE Internet of Things Journal
  • Much value in a brownfield Industrial Internet of Things (IIoT) implementation resides at its edge tier, where new types of devices and technologies are deployed to interoperate the legacy industrial control systems with servers and systems in the cloud, and leverage the benefits of the Internet of Things technologies. One of these novel devices is the IIoT edge gateway, which is used to connect critical physical systems with the cyber world, and to provide consistent storage, processing, and… CONTINUE READING
    11 Citations
    Developing a Security Testbed for Industrial Internet of Things
    • PDF
    Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
    • 1
    Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network
    • 1
    Blockchain-Enabled Safety-as-a-Service for Industrial IoT Applications
    • 4

    References

    SHOWING 1-10 OF 44 REFERENCES
    The rise of ransomware and emerging security challenges in the Internet of Things
    • 113
    • Highly Influential
    Out of Control : Ransomware for Industrial Control Systems
    • 22
    • PDF
    Network detection of ransomware delivered by exploit kit
    • 3
    • Highly Influential
    • PDF
    Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
    • 96
    Virtualization of SCADA testbeds for cybersecurity research: A modular approach
    • 13
    HelDroid: Dissecting and Detecting Mobile Ransomware
    • 130
    • PDF
    Survey on Ransomware: A New Era of Cyber Attack
    • 4