首页> 外文会议>IEEE International Conference on Advanced Information Networking and Applications >Covert Channels in IoT Deployments Through Data Hiding Techniques
【24h】

Covert Channels in IoT Deployments Through Data Hiding Techniques

机译:通过数据隐藏技术实现物联网部署中的隐蔽渠道

获取原文

摘要

Interconnected and always on devices are continuously and rapidly growing in number and, according to a study from Cisco, will be three times the number of humans on earth in 2021. Unfortunately, recent events such as the DDoS mounted using the Mirai botnet, have shown that the level of resilience to intrusion and hacking of these devices is far from optimal and puts the systems connected to the Internet of Things in serious danger. Among such systems, industrial systems that are now being integrated into the IoT ecosystem, have revealed to be weak against the threat coming from the IT world. Such previously inexistent scenario opens up to a plethora of new attack patterns leveraging previously unexploited techniques. Among these, we argue that convert channels built by leveraging information hiding techniques could be exploited. To this aim, this position paper introduces the usage of convert channels, built on information hiding techniques, in IoT scenarios.
机译:互联且始终在设备上的设备数量持续快速增长,根据思科的一项研究,到2021年,这个数量将是地球上人类的三倍。不幸的是,最近发生的事件(例如使用Mirai僵尸网络安装的DDoS)已经表明这些设备的入侵和黑客防御能力远非最佳,这使连接到物联网的系统面临严重危险。在这样的系统中,现已集成到IoT生态系统中的工业系统显示出对来自IT世界的威胁的抵抗力很弱。这种先前不存在的场景利用先前未开发的技术开辟了许多新的攻击模式。其中,我们认为可以利用利用信息隐藏技术建立的转换渠道。为此,本立场文件介绍了基于信息隐藏技术的物联网场景中转换通道的用法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号