4.2 Article

Remotely Exploiting AT Command Attacks on ZigBee Networks

期刊

出版社

WILEY-HINDAWI
DOI: 10.1155/2017/1723658

关键词

-

资金

  1. European Union [732907, 731558]

向作者/读者索取更多资源

Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Multidisciplinary Sciences

High blood flow shear stress values are associated with circulating tumor cells cluster disaggregation in a multi-channel microfluidic device

Alessandra Marrella, Arianna Fedi, Gabriele Varani, Ivan Vaccari, Marco Fato, Giuseppe Firpo, Patrizia Guida, Nicola Aceto, Silvia Scaglione

Summary: This study developed a new multichannel microfluidic device to simulate different blood flow shear stresses and analyze their correlation with CTC cluster behavior. The results demonstrated that higher values of WSS decrease the viability of single CTCs and lead to the disaggregation of CTC clusters.

PLOS ONE (2021)

Article Chemistry, Analytical

A Generative Adversarial Network (GAN) Technique for Internet of Medical Things Data

Ivan Vaccari, Vanessa Orani, Alessia Paglialonga, Enrico Cambiaso, Maurizio Mongelli

Summary: The application of machine learning and artificial intelligence in the medical field is expanding, with a focus on remote monitoring and data augmentation for accurate algorithms. By using generative adversarial networks (GANs) to create synthetic datasets, and validating them through machine learning approaches, the accuracy of the synthetic data can be demonstrated.

SENSORS (2021)

Article Chemistry, Analytical

Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach

Syed Ghazanfar Abbas, Ivan Vaccari, Faisal Hussain, Shahzaib Zahid, Ubaid Ullah Fayyaz, Ghalib A. Shah, Taimur Bakhshi, Enrico Cambiaso

Summary: The Internet of Things (IoT) allows objects to connect to the Internet for meaningful purposes, but also faces increasing security threats, particularly phishing attacks targeting IoT devices. This paper proposes a threat modelling approach to identify and mitigate cyber-threats that may cause phishing attacks, focusing on smart autonomous vehicular systems and smart homes as significant IoT use cases. The proposed approach aims to support IoT researchers, engineers, and policymakers in securing IoT devices and systems during the early design stages for secure deployment in critical infrastructures.

SENSORS (2021)

Article Chemistry, Analytical

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System

Muhammad Husnain, Khizar Hayat, Enrico Cambiaso, Ubaid U. Fayyaz, Maurizio Mongelli, Habiba Akram, Syed Ghazanfar Abbas, Ghalib A. Shah

Summary: In this paper, a MQTT parsing engine is designed and developed to serve as an initial layer in network-based IDS for extensive checking of IoT protocol vulnerabilities and improper usage. By rigorously validating packet fields, the proposed solution effectively detects and prevents the exploitation of vulnerabilities on IoT protocols.

SENSORS (2022)

Article Computer Science, Artificial Intelligence

Sensitivity of Logic Learning Machine for Reliability in Safety-Critical Systems

Sara Narteni, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli

Summary: Nowadays, artificial intelligence is rapidly developing in many fields, leading to the emergence of reliable AI that ensures the safety of autonomous decisions. Sensitivity analysis of explainable AI models can help design safety regions in the feature space with statistical zero error.

IEEE INTELLIGENT SYSTEMS (2022)

Proceedings Paper Computer Science, Information Systems

On The Detection Of Adversarial Attacks Through Reliable AI

Ivan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli

Summary: Adversarial machine learning manipulates datasets to deceive machine learning algorithm decisions. In this study, a new approach based on eXplainable and Reliable AI is proposed to detect adversarial attacks. Experimental results demonstrate that canonical algorithms may struggle to identify attacks, while the proposed approach is capable of accurately identifying different adversarial settings.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Computer Science, Software Engineering

Web security and data dumping: The Cookidump case

Enrico Cambiaso, Maurizio Aiello

Summary: In this paper, the authors discuss the impact of legitimate data dumping activities, specifically scraping/storing data shown on browsers, in the web security field. They propose Cookidump as a tool to evaluate the dumping of all available recipes on the Cookidoo (c) website portal. Although the focus is on recipe dumping, the authors also discuss the potential impact of such activities for other web applications hosting sensitive information.

SOFTWARE IMPACTS (2022)

Article Computer Science, Information Systems

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics

Ivan Vaccari, Alberto Carlevaro, Sara Narteni, Enrico Cambiaso, Maurizio Mongelli

Summary: This article discusses the wide adoption of machine learning algorithms and the concept of adversarial machine learning attacks. The research proposes new approaches to detect and mitigate these attacks and compares their performance to traditional algorithms.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

On the Intersection of Explainable and Reliable AI for Physical Fatigue Prediction

Sara Narteni, Vanessa Orani, Enrico Cambiaso, Matteo Rucco, Maurizio Mongelli

Summary: In this study, the use of eXplainable AI (XAI) in detecting physical fatigue during manual material handling task simulation is explored. Global rule-based XAI models (LLM and DT) are compared to black-box models (NN, SVM, XGBoost) in terms of performance, and global models are also compared to local ones (LIME over XGBoost). Surprisingly, both global and local approaches yield similar conclusions in terms of feature importance.

IEEE ACCESS (2022)

Proceedings Paper Computer Science, Information Systems

DoS Attacks in Available MQTT Implementations

Umberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso

Summary: The Internet of Things is a widely adopted and pervasive technology that is also vulnerable to attacks due to the volume of shared data and the availability of insecure products. This paper investigates two denial of service attacks targeting MQTT message queues, demonstrating their effectiveness and proposing mitigations in open-source MQTT implementations. The research results are integrated into the MQTTSA tool to improve security awareness in MQTT-based deployments.

ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (2021)

Proceedings Paper Computer Science, Artificial Intelligence

From Explainable to Reliable Artificial Intelligence

Sara Narteni, Melissa Ferretti, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli

Summary: This study proposes a solution based on eXplainable AI models to define safety regions in the feature space, aiming to reduce false negatives. The results show that the effectiveness of the algorithms strongly depends on the level of noise in the dataset.

MACHINE LEARNING AND KNOWLEDGE EXTRACTION (CD-MAKE 2021) (2021)

Article Computer Science, Information Systems

Exploiting Internet of Things Protocols for Malicious Data Exfiltration Activities

Ivan Vaccari, Sara Narteni, Maurizio Aiello, Maurizio Mongelli, Enrico Cambiaso

Summary: The Internet of Things is a widely adopted technology that is also highly relevant in cybersecurity due to the volume and sensitivity of data shared and the availability of affordable but insecure products. This paper proposes a novel cyber threat using the MQTT protocol for tunneling attacks in IoT networks, which could be used by malicious users to steal sensitive information. Experimental results show that using MQTT for tunneling purposes is effective, especially for payloads up to 3000 bytes. Additionally, the study presents a machine learning-based approach to detect the proposed MQTT tunneling attack, with some algorithms achieving over 95% accuracy in identifying the attack.

IEEE ACCESS (2021)

暂无数据