Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.

[1]  Chen Wang,et al.  Locating Rogue Access Point Using Fine-Grained Channel Information , 2017, IEEE Transactions on Mobile Computing.

[2]  M. S. Dahiya,et al.  Cyber Reconnaissance: An Alarm before Cyber Attack , 2013 .

[3]  Yan Zhang,et al.  Attack Detection and Distributed Forensics in Machine-to-Machine Networks , 2016, IEEE Network.

[4]  Eman Mousavinejad,et al.  A Novel Cyber Attack Detection Method in Networked Control Systems , 2018, IEEE Transactions on Cybernetics.

[5]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[6]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[7]  Jugal K. Kalita,et al.  Towards Generating Real-life Datasets for Network Intrusion Detection , 2015, Int. J. Netw. Secur..

[8]  Zainab S. Alwan,et al.  Detection and Prevention of SQL Injection Attack: A Survey , 2017 .

[9]  Muhannad Quwaider,et al.  IoT Privacy and Security: Challenges and Solutions , 2020, Applied Sciences.

[10]  Jamal Raiyn,et al.  A survey of Cyber Attack Detection Strategies , 2014 .

[11]  Adam N. Joinson,et al.  Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.

[12]  Simarpreet Kaur,et al.  A Detailed Survey and Classification of Commonly Recurring Cyber Attacks , 2016 .

[13]  Dong Seong Kim,et al.  Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things , 2019, ArXiv.

[14]  Christopher J Baker Cybersecurity for Critical Infrastructure , 2015 .

[15]  V. Shanmuganathan A Survey on Gray Hole Attack in MANET , 2012 .

[16]  Luiz Eduardo Soares de Oliveira,et al.  Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.

[17]  Byzantine Attacks and its Security Measures in Mobile Adhoc Networks , 2022 .

[18]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[19]  Hal Berghel Wireless infidelity I: war driving , 2004, CACM.

[20]  Richard Lippmann,et al.  The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.

[21]  Zhiguo Shi,et al.  Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory , 2020, IEEE Transactions on Cybernetics.

[22]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[23]  Andreas Hotho,et al.  A Survey of Network-based Intrusion Detection Data Sets , 2019, Comput. Secur..

[24]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[25]  Sukumar Mishra,et al.  A Stealth Cyber-Attack Detection Strategy for DC Microgrids , 2019, IEEE Transactions on Power Electronics.

[26]  Harish Kumar,et al.  A Reference Dataset for Network Traffic Activity Based Intrusion Detection System , 2015, Int. J. Comput. Commun. Control.

[27]  Nilanjan Dey,et al.  Developing residential wireless sensor networks for ECG healthcare monitoring , 2017, IEEE Transactions on Consumer Electronics.

[28]  Alejandro Zunino,et al.  An empirical comparison of botnet detection methods , 2014, Comput. Secur..

[29]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[30]  Jiankun Hu,et al.  A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.

[31]  Dimitris Mitropoulos,et al.  Fatal injection: a survey of modern code injection attack countermeasures , 2017, PeerJ Comput. Sci..

[32]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[33]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[34]  Uthman A. Baroudi,et al.  Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges , 2019, Neurocomputing.

[35]  Nick Feamster,et al.  Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.

[36]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[37]  Nishtha Kesswani,et al.  Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets using Deep Learning in IoT , 2020 .

[38]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[39]  Alexander D. Kent,et al.  Unified Host and Network Data Set , 2017, Security Science and Technology.

[40]  Daniel E. Lucani,et al.  On Goodput and Energy Measurements of Network Coding Schemes in the Raspberry Pi , 2016 .

[41]  Mouad Ben Mamoun,et al.  An Overview on SDN Architectures with Multiple Controllers , 2016, J. Comput. Networks Commun..

[42]  Roberto Therón,et al.  UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..

[43]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .

[44]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[45]  Qing-Long Han,et al.  Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.

[46]  Mohiuddin Ahmed,et al.  Intelligent Big Data Summarization for Rare Anomaly Detection , 2019, IEEE Access.

[47]  Deris Stiawan,et al.  Investigating Brute Force Attack Patterns in IoT Network , 2019, J. Electr. Comput. Eng..

[48]  Aiko Pras,et al.  SSH Compromise Detection using NetFlow/IPFIX , 2014, CCRV.

[49]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[50]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[51]  David Geer,et al.  Malicious bots threaten network security , 2005, Computer.

[52]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[53]  Sancheng Peng,et al.  New deep learning method to detect code injection attacks on hybrid applications , 2018, J. Syst. Softw..

[54]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[55]  Frank Beer,et al.  A new Attack Composition for Network Security , 2017, DFN-Forum Kommunikationstechnologien.

[56]  Onur Mutlu,et al.  RowHammer: A Retrospective , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[57]  Jun Ho Huh,et al.  Detecting DNS-poisoning-based phishing attacks from their network performance characteristics , 2011 .

[58]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[59]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[60]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[61]  Cristina Alcaraz,et al.  Cyber Stealth Attacks in Critical Information Infrastructures , 2018, IEEE Systems Journal.

[62]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[63]  Jiankun Hu,et al.  Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..

[64]  Iqbal Gondal,et al.  Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.

[65]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[66]  J. Quisquater,et al.  A Practical Implementation of the Timing Attack , 1998, CARDIS.

[67]  Chong Li,et al.  Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach , 2018, IEEE Transactions on Smart Grid.

[68]  Ajay Guleria,et al.  A New Labeled Flow-based DNS Dataset for Anomaly Detection: PUF Dataset , 2018 .

[69]  Prakash Veeraraghavan,et al.  Privacy and Security Challenges and Solutions in IOT: A review , 2019, IOP Conference Series: Earth and Environmental Science.

[70]  Niccolo Cascarano,et al.  GT: picking up the truth from the ground for internet traffic , 2009, CCRV.

[71]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[72]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[73]  Ali A. Ghorbani,et al.  Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling , 2017, Comput. Networks.

[74]  Sajjan G. Shiva,et al.  Comparative Analysis of ML Classifiers for Network Intrusion Detection , 2019, ICICT.

[75]  M. North,et al.  Ransomware: Evolution, Mitigation and Prevention , 2017 .

[76]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[77]  Alexander D. Kent,et al.  Cyber security data sources for dynamic network research , 2016 .

[78]  Peng Liu,et al.  The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved , 2018, IEEE Internet of Things Journal.

[79]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[80]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[81]  Julia E. Sullivan,et al.  How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid , 2017 .

[82]  Maruf Pasha,et al.  A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.