Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only the device itself, but also the application field in which the IoT device operates. Evidently, identifying and addressing every single vulnerability is an arduous, if not impossible, task. Attack taxonomies can assist in classifying attacks and their corresponding vulnerabilities. Security countermeasures and best practices can then be leveraged to mitigate threats and vulnerabilities before they emerge into catastrophic attacks and ensure overall secure IoT operation. Therefore, in this paper, we provide an attack taxonomy which takes into consideration the different layers of IoT stack, i.e., device, infrastructure, communication, and service, and each layer's designated characteristics which can be exploited by adversaries. Furthermore, using nine real-world cybersecurity incidents, that had targeted IoT devices deployed in the consumer, commercial, and industrial sectors, we describe the IoT-related vulnerabilities, exploitation procedures, attacks, impacts, and potential mitigation mechanisms and protection strategies. These (and many other) incidents highlight the underlying security concerns of IoT systems and demonstrate the potential attack impacts of such connected ecosystems, while the proposed taxonomy provides a systematic procedure to categorize attacks based on the affected layer and corresponding impact.
翻译:互联网(IoT)装置正在我们生活中变得无处不在,其应用范围从消费者领域到商业和工业系统都有,互联网装置的急剧增长和广泛采用,加强了在设备开发生命周期内健全和稳健的网络安全做法的重要性。IoT相关弱点如果得到成功利用,不仅能够影响装置本身,而且能够影响IoT装置操作的应用领域。显然,查明和处理每一个弱点都是一项艰巨的任务,如果不是不可能的话,也是一项艰巨的任务。攻击分类有助于对攻击及其相应弱点进行分类。随后,安全对策和最佳做法可以被用来减轻威胁和脆弱性,以免它们演变成灾难性攻击,并确保IoT作业的全面安全。因此,在本文件中,我们提供了一种攻击分类,考虑到IoT堆的不同层,即装置、基础设施、通信和服务,以及每一层指定可由对手利用的特性。此外,利用9个真实世界网络事件,将IoT装置作为目标部署在消费者、商业和工业攻击中,其潜在威胁和风险的分类,同时我们描述了IT系统开发程序的潜在影响。