A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

01/06/2021
by   Syed Ghazanfar Abbas, et al.
0

Despite the surging development and utilization of IoT devices, the security of IoT devices is still in infancy. The security pitfalls of IoT devices have made it easy for hackers to take over IoT devices and use them for malicious activities like botnet attacks. With the rampant emergence of IoT devices, botnet attacks are surging. The botnet attacks are not only catastrophic for IoT device users but also for the rest of the world. Therefore, there is a crucial need to identify and mitigate the possible threats in IoT devices during the design phase. Threat modelling is a technique that is used to identify the threats in the earlier stages of the system design activity. In this paper, we propose a threat modelling approach to analyze and mitigate the botnet attacks in an IoT smart home use case. The proposed methodology identifies the development-level and application-level threats in smart home use case using STRIDE and VAST threat modelling methods. Moreover, we reticulate the identified threats with botnet attacks. Finally, we propose the mitigation techniques for all identified threats including the botnet threats.

READ FULL TEXT

page 1

page 2

research
05/21/2018

IoT2Vec: Identification of Similar IoT Devices via Activity Footprints

We consider a smart home or smart office environment with a number of Io...
research
07/06/2020

Smart Home, security concerns of IoT

The IoT (Internet of Things) has become widely popular in the domestic e...
research
01/30/2023

Threat Modelling in Virtual Assistant Hub Devices Compared With User Risk Perceptions (2021)

Despite increasing uptake, there are still many concerns as to the secur...
research
06/05/2023

Sustainable Adaptive Security

With software systems permeating our lives, we are entitled to expect th...
research
04/24/2023

iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?

Evil twin attack on Wi-Fi network has been a challenging security proble...
research
09/09/2021

Social Media Monitoring for IoT Cyber-Threats

The rapid development of IoT applications and their use in various field...
research
06/07/2023

A GDPR-compliant Risk Management Approach based on Threat Modelling and ISO 27005

Computer systems process, store and transfer sensitive information which...

Please sign up or login with your details

Forgot password? Click here to reset