Abstract
Internet of Things (IoT) devices are much closer to users than personal computers used in traditional computing environments. Due to prevalence of IoT devices, even if they are compromised and used in attacks, it is difficult to detect and respond to them. Currently, there has been extensive research on threat modeling for cyberattacks. However, there remains a significant gap in research concerning threat modeling for attacks specially targeting IoT devices within the fifth-generation communication environment. In this paper, we present IoT Targeting-Threat Modeling(I3TM) framework established by analyzing botnets that are appeared before 2021 such as Mirai, Pink etc. Through this framework, we identify tactics and techniques to respond to the attacks. Using the identified tactics and techniques from our proposed framework, we can promptly respond to the newly detected attacks. We constructed a Threat Modeling Framework Keyword-Based Metrics to show extracted keywords from reports, academic papers, and white paper that identifies the features of botnet. We also provide an objective way to apply those keywords to the framework. Our framework is organized to analyze the attack process of botnets that may occur against IoT. The framework derives execution for each tactic for objective analysis based on keywords. In the validation for the framework, I3TM identified eight Tactics from Medusa botnet. If the application of the I3TM framework is continuously accumulated, a baseline of similar attack methods and data will be formed. In future research, we are planning to append mitigations for the attacks targeting IoT to the I3TM framework.
Keywords: IoT, Botnet, Threat modeling framework, I3TM
1. Introduction
Distributed denial of service (DDoS) attacks can target devices and infrastructure connected to the Internet of Things (IoT). For example, in the absence of adequate security measures such as intrusion prevention systems (IPS), power-saving mechanisms (PSM) [1] commonly used in low-power devices can lead to service disruptions. In addition, as the fifth generation (5G) massive network [2] is built, attacks exploiting radio frequencies and vulnerabilities in location-based services and sensors may occur. Botnet attacks and malware targeting IoT have steadily increased every year since the Hydra attack [3] in 2008. In addition, in 2016, Mirai [4] caused large-scale damage to DNS service provider Dyn. After Mirai's source code was released, similar attacks became increasingly active. Various variants of the Mirai botnets, such as Hajime, Mozi, IoT Reaper, and Satori, were observed [[5], [6], [7], [8]]. Recently, attacks targeting IoT, such as Medusa and V3G4, appeared.
To respond to such attacks, research on cybersecurity frameworks to detect and defend against botnet attacks has begun to appear. Since IoT can be controlled through a smartphone, mobile can also be an access point. Studies on cybersecurity frameworks for IoT environments include a study using machine learning-based IoT targeting botnet-related data sets [9], CyTEA for creating simulated cyber threats in cybersecurity training systems [10], and a study for mobile network topology. It may include Bhadra [11], a modeling framework, and the CONCORDIA Mobile Threat Modeling Framework (CMTMF) [12], which develops attack and defense taxonomies for threats. Some studies on cybersecurity frameworks targeting the IoT environment have been conducted, but there still needs to be dominant research. In particular, among the many attacks against the IoT environment, botnets can cause significantly considerable damage to all device connected to the bot so a study on a security framework specialized for botnets is required rather than integrating botnets with various attacks [13].
Since the IoT environment is much closer to the users than the traditional computing environment based on personal computers, the above cybersecurity framework and relevant technologies should be considered to achieve the 5G hyperconnected society.
In this paper, we investigate the possible threats of botnet attacks against the IoT environment on a case-by-case basis. We propose a threat modeling framework—IoT Targeting-Threat modeling (I3TM)—based on the observed attack related-techniques. This framework aims to rapidly analyze the attack flow when an actual botnet attack occurs. This framework can be used to respond to and prevent similar attacks that may arise in the future by providing mitigation techniques based on this analysis. To design such a framework, we investigated botnets that were observed targeting the IoT environment before 2021 and systematically organized the attack-related tactics and techniques they used. Through our efforts, we mapped the investigated attack techniques to each step of the botnet's attack flow, which is divided into three steps: attack mounting, attack execution, and attack result. Attack mounting refers to the access behavior that initiates an attack and consists of 4 tactics and 19 techniques. Attack execution refers to the malicious behavior executed after the attack accesses the target. This step contains 9 tactics and 33 techniques. Attack result refers to the attack's impact (and any additional impact or damage) and consists of 5 tactics and 23 techniques. In addition, we analyzed reports, academic papers, and white papers to identify keywords related to tactics and techniques for each step of I3TM. Based on the analysis, we defined a keyword table, which is used to analyze botnet attacks. We conducted a case study to examine a well-known botnet to validate our proposed framework. As mentioned earlier, I3TM was designed based on the attack techniques used by botnets before 2021. We employed botnets that occurred after 2022 for the case study to prove that I3TM can be utilized to analyze unseen botnets. In this paper, we construct the attack analysis report that classifies eight types of features that can be occurred in botnet threat information. The eight types of features are classified into device access, malware distribution (access methods), malicious behavior, malware infection method, infected targets, additional attack methods, attack scope, and final damage. Then we extract keywords from the description of an botnet threat information and apply them to our proposed framework. We analyzed the Medusa botnet as an example, using this approach. As a result of the verification, we demonstrated that our approach can successfully detect potential attack keywords and identify the attack direction within our framework. Also, we confirmed that our framework can be applied Medusa's attack behavior very quickly, using keywords we extracted. The contributions of this paper consist of three parts.
-
●
We propose a threat modeling framework for 5G massive IoT Network and present keyword based detection method.
-
●
We verify our approach by analyzing the Medusa botnet as an example utilizing our proposed Attack Analysis Report and the framework.
-
●
We build a botnet-based threat modeling framework targeting 5G massive IoT. We expect high effectiveness in detecting attacks on IoT botnets through this framework and provide the starting point of the botnet-based threat modeling framework research.
The remainder of this paper is organized as follows: In Section 2, we present IoT botnet attack cases and analyze known threat modeling frameworks. Section 3 describes the structure of the I3TM frameworkSection 4 presents a case study on a 2022 botnet attack to validate the effectiveness of the I3TM framework. In Section 5, we discuss the purpose, limitations, and broader implications of this research. Finally, Section 6 concludes the paper and outlines potential directions for future work.
2. Related work and background
In this section, we introduce some botnets observed in the past and studies related to threat modeling. This analysis is used as material to describe the threat modeling framework for the botnet targeting the IoT environment in the 5G massive network presented in Section 3.
2.1. Botnet
Since the inception of the botnet and DDoS attacks, the scale of botnet attacks has grown at the national level. Gafgyt (called Bashlite, Lizkebab, Torlus) is a botnet that infected more than 1 million devices from 2014 to 2016 [[14], [15], [16]]. The source code of Gafgyt has been leaked. Mirai, which broke out in 2016, has a vast DDoS attack in which the Internet was paralyzed for about 2 h in half of the U.S. after Dyn, a hosting service company, was attacked by DDoS. Mirai is a representative botnet attack exploiting vulnerabilities of IoT devices. Mirai's source code was released in October 2016, which allowed new botnet attacks to continue to appear. With the release of Mirai's source code, many variants have been shown, such as Okiru, Echobot, Hajime, and Mozi. In addition, the botnets used various attack techniques. Mirai compromised lots of IoT devices with weak passwords on the Telnet. IoT Reaper exploited vulnerabilities known as indiscriminate substitution attacks. Satori propagated itself through specific ports without scanning. Mozi combined the vulnerabilities of Gafgyt, Mirai, IoT Reaper, and various other botnets to attack IoT devices. Table 1 classifies and organizes attack features based on six botnet features, tactics, techniques, and keywords.
Table 1.
Feature Classification of IoT botnets.
Botnet | Feature | Tactics | Techniques | Keyword |
---|---|---|---|---|
Mirai | Targets IoT devices with weak passwords, DDoS attacks | Reconnaissance, Resource Development, Initial Access, Attack Execution, Impact | Active scanning, Vulnerability scanning, DDoS, Brute forcing credentials | Scan, Random, Scanning IP blocks, Brute-force |
Hajime | Update functionality, IP Blacklist | Reconnaissance, Resource Development, Initial Access | Passive scanning, Dictionary attack, IP Blacklist | Dictionary, IP, Blacklist, Passive |
IoT Reaper | Known vulnerabilities | Reconnaissance, Resource Development, Initial Access, Privilege Escalation | Vulnerability scanning, Exploit public facing application, Code injection | Vulnerability, Exploit, Code, Injection |
Satori | Huawei and Realtek vulnerabilities | Reconnaissance, Resource Development, Initial Access, Privilege Escalation | Vulnerability scanning, Exploit public facing application, Code injection | Vulnerability, Exploit, Code, Injection |
Pink | Fiber-optic routers, DDoS, Ads, Hybrid Network | Reconnaissance, Resource Development, Initial Access, Attack Execution, Impact | Active scanning, Vulnerability scanning, DDoS, Advertisement-insertion | Scan, Random, Scanning IP blocks |
Mozi | Telnet vulnerabilities, DHT Protocol | Reconnaissance, Resource Development, Initial Access, Attack Execution | Active scanning, Vulnerability scanning, DDoS, Brute forcing credentials | Scan, Random, Scanning IP blocks, Brute-force |
2.1.1. Mirai
Mirai was first discovered in 2016 by Malware MustDie, a White-Hat malware research group. Mirai attacked Dyn, a domain name system (DNS) provider, in October 2016. Due to this attack, 76 websites were paralyzed, including Twitter, Netflix, and the New York Times [[17], [18], [19], [20], [21]]. Mirai's source code was revealed. This event contributed to the creation of numerous IoT botnets and malware. Mirai was designed to perform DDoS attacks based on generic routing encapsulation (GRE), internet protocol (IP), greeth, transmission control protocol (TCP) with SYN and ACK flags, simple text-oriented messaging protocol (STOMP), DNS, user datagram protocol (UDP), and hypertext transfer protocol (HTTP) traffic. Mirai performs a more precise capability for executing DDoS attacks compared to Aidra, resulting in greater service disruption. Mirai, as malware derived from Bashlite, verifies the accessibility of port 23 and includes a scanning function to search Telnet services on port 2323. Mirai's workflow is quite simple. It triggers DDoS attacks, performs scanning on initial execution, infects vulnerable devices, and makes them part of the botnet. The target of Mirai was Linux-based IoT devices that operate in various processor architectures such as advanced reduced instruction set computer (RISC) machine (ARM), microprocessor without interlocked pipeline stages (MIPS), and PowerPC (PPC) through cross-compilation. The Mirai botnet's malware consists of four components: "C&C server and loader," "Report server hosting database," "scanner," and "bot." The scan function generates a random IP address and logs into the shell by pre-attacking vulnerable IoT devices that have not changed their preference using about 60 factory-shipped accounts on port 23.
2.1.2. Hajime
Hajime was first reported in 2016, and it attempted to spread malware to all IoT devices, resulting in around 300,000 devices being infected since 2017 [22]. Hajime is similar to Mirai in terms of the target device's types and the way it manages infected devices (bots) [23]. Hajime's malware has an update functionality that allows attackers to update features. Hajime's malware generates an IP address for another IoT device to infect and check whether the addresses are included in a blacklist. The blacklist is a hard-coded list of IP addresses that should be excluded from attack targets, such as national intelligence agencies and security companies. After checking port 23 of the target designated the IP address generated above, the malware attempts to sign into the target device with a list of account information. If the authentication is successful, the malware tries to access a shell and execute various commands, such as cp, cat, cd, and chmod, to check if the malicious payload was downloaded and had a write-permission for the specific path. Hajime creates malicious binary data by converting hexadecimal value into binary value using the Echo command. When the creation of malicious binary data is successfully completed, four actions (time synchronization through Network Time Protocol (NTP), disguising itself as a Telnet daemon program, checking whether the configuration file is updated, and setting the initial value of network communication) are executed. The attack proceeds sequentially; The malware initiates an attack by sequentially attempting a predefined Telnet's default accounts on an IoT device; The infected device downloads the up-to-date configurations and modules from other devices through the peer-to-peer (P2P) communication; The device tries to compromise other IoT devices, which is not yet infected. Hajime has evolved with simple object access protocol (SOAP)/HTTP-based communication vulnerabilities, such as radio waves, using TR-069 vulnerabilities.
2.1.3. IoT reaper
IoT Reaper was first reported in 2018 and is a variant botnet derived from the Mirai botnet. The botnet targeted IoT devices such as cameras, camcorders, and wireless routers and has infected more than 2 million IoT devices [[24], [25], [26]]. The number of infected devices by IoT Reaper continues to increase, but the scale of the damage is not precisely estimated because the bots remain inactive. IoT Reaper is written in the Lua language developed to run scripts and can perform attacks much more agile than Mirai Botnet due to its imperative and procedural language nature. The attack of IoT Reaper utilizes the IoT devices' well-known vulnerabilities regarding HTTP. IoT Reaper's bot scans devices utilized for attack propagation through the known vulnerabilities and feedback to C&C servers. Afterward, malware is delivered through loaders and downloaders based on the information collected by the C&C servers. When the malware is installed on the target device, it becomes part of the botnet and makes a malicious behavior to attack other devices. The C&C servers transmit commands, initiating attacks or spreading malware to other IoT devices through the Internet. Unlike the Mirai botnet, which scans the port of Telnet, it first conducts the TCP half scan for a specific port. The first ports to be scanned include 20480, 20736, 36895, 37151, 22528, 16671, 1434, 20992, 4135, 64288, 45090, 21248, 21504, 31775, 39455, 47115, and 42254. In the second scanning, the ports regarding the web service on the IoT devices are explored: 80, 82, 83, 84, 88, 1080, 3000, 3749, 8001, 8060, 8080, 8081, 8090, 8443, 8880, and 10000. If the bot recognizes the opened ports on the device, it infiltrates it using the onboard vulnerabilities in IoT Reaper. While the Mirai botnet could gain credentials and access the system through the brute-force attack using IoT's default accounts, IoT Reaper can take control of the device through the known vulnerabilities. Also, unlike Mirai Botnet, which maintains consistent connections between clients and C&C servers, IoT Reaper checks into the C&C servers using unencrypted HTTP communication every 10 s. In addition, IoT Reaper has over 100 DNS open resolver servers that act as DNS cache servers that respond to all DNS requests from the clients. Through this, the IoT Reaper could be used for DNS Amplification Attacks.
2.1.4. Satori
Satori, a variant of the Mirai botnet, was reported in 2017. Unlike Mirai, Satori attempts remote access using vulnerabilities in Huawei routers and specific devices using the Realtek software development kit (SDK) instead of the Telnet scanner module. The botnet infected over 280,000 IoT devices, and it was estimated that an additional 220,000 IoT devices could be affected [[27], [28], [29]]. An attacker (or Satori's malware) uploads malware on Huawei's home router using the vulnerability of a universal plug-and-play (UPNP) protocol (port 37215). The vulnerability, allowing the attacker to execute arbitrary commands on the device, was used to download and execute malicious payloads. Also, Satori's malware employs a vulnerability of Realtek's UPNP SOAP interface (port 52869), allowing a command execution. With these vulnerabilities, Satori secures control over the IoT device and executes the commands from C&C servers to perform malicious behaviors. Once the device is infected, Satori's malware tries to self-propagate into other IoT devices like a worm. Satori can attack various architectures: ARM, MIPS, PPC, x86, x86_64, SuperH, SPC, and ARC. Like other botnets, Satori could carry out DDoS attacks (TCP or UDP flooding attacks) following the order from the C&C servers.
Another variant of Satori is Satori Coin Robber, discovered in 2018. Interestingly, this malware targeted Claymore Miner, an Ethereum coin mining program, and stole ether using vulnerabilities from the victim. Satori Coin Robber performed the port scanning on TCP ports 3333, 37215, and 52869, like the original Satori. Especially port 3333 was used to check Claymore Miner. Satori Coin Robber adopted asynchronous network connectivity to improve scanning efficiency. The malware attacks Claymore Miner with vulnerabilities allowing an arbitrary read/write remotely. This malware mainly targeted the Claymore Miner-installed device with port 3333 while the cryptographic authentication was disabled. Except for the propagational feature, Satori Coin Robber has several exploitation features like getting mining status information, replacing file reboots, mining pools, getting addresses of wallets, and rebooting hosts with new wallets. C&C server communication is performed based on DNS protocol and utilizes hard-coded IP addresses.
2.1.5. Pink
Pink was reported as the first IoT botnet with a hybrid topology. Pink adopted a centralized C&C server and a decentralized network architecture like a P2P network. The primary targets of this botnet were routers with optical fiber based on MIPS architecture [30]. Over 1.6 million devices were estimated to be infected by Pink's malware. Pink botnet performed DDoS attacks along with advertisement-insertion attacks within HTTP-based websites. The attacker shut down TCP-17998 service and extranet connection to TCP-17998 via iptables, to block any access to Pink. Additionally, the attacker disabled TR-069 update channel, then performed the attack via the function of TCP-80 HTTP service file removal. Pink exploited a vulnerability—regarding misconfiguration and mis-implementation—of the router's TCP-17998 control service, a management interface for administrators. This vulnerability was used for Pink's initial access. Subsequently, Pink's malware secures control over the public network, which the infected router covers.
There are two methods that Pink distributes the botnet. First method distributes the botnet via third-party services. Pink accesses configuration files in remote repositories like GitHub via DNS-over-HTTPS(DoH) then connects to the servers or controllers designated by the configuration files. The controller is composed of a timestamp, the latest C&C address, the latest updated bot address, a secure DNS server address, a server-side public key content (base 64), and the proxy-related option. The information of configuration file is encrypted with the elliptic curve digital signature algorithm (ECDSA) which is frequently used in cryptocurrency transactions such as Bitcoin and Ethereum. The information of configuration file can be easily converted to the GitHub project address by adding transaction record to configuration file. In addition, the attacker has distributed the botnet via the Chinese website in a similar distributing method via GitHub. The second botnet distribution method is a distribution method via Peer-to-Peer (P2P). Pink bypasses the detection by utilizing UDP-123 port, which is the default port for the Network Time Protocol (NTP) Service. Following this process, a peer probe request is sent to four B-segment addresses, and in the absence of C&C information, an error message is returned. However, if C&C information is received, a response including the message header is returned.
2.1.6. Mozi
Mozi is another variant botnet of Mirai, reported in 2019. Mozi's primary targets are the IoT devices like wired-or-wireless routers, CCTVs, video recording devices, and PCs. It has infected over 1.5 million IoT devices around the world. Mozi exploits vulnerabilities of Telnet on IoT devices to infect them [30,31]. When the malware was installed, the newly infected device acted as a bot and was automatically attached to Mozi's P2P network as a node. Mozi was implemented based on the distributed hash table (DHT) protocol, frequently used to store node contact information on P2P platforms like torrents. Based on this protocol, the botnet network could be quickly set up without a server. Mozi hid a malicious payload within regular-large amounts of DHT traffic, making it difficult to be detected. Also, Mozi improved its integrity and security with ECDSA 384 and x7or algorithms. Once Mozi's malware infiltrated an IoT device, it ran an HTTP service with any local port. This local port could be utilized for various purposes, like receiving addresses for downloading a malicious payload from a configuration file produced by the attacker. The addresses were shared within the botnet for malware propagation.
2.2. Threat modeling framework
Threat modeling framework provides a systematic approach to identifying, understanding, and managing security threats against a system. The framework generally helps to identify security threats while designing or implementing a system or application and plays an essential role in preparing response plans for security threats. This section presents several well-known threat modeling frameworks: MITRE ATT&CK, Bhadra, and CONCORDIA-CMTMF.
2.2.1. MITRE ATT&CK and MITRE FiGHT
MITRE ATT&CK [32,33] is a security framework that classifies and categorizes information on various attack techniques by MITRE Corporation in the United States. Attack behavior based on actual cyberattack cases was classified and analyzed into several tactics and techniques. In other words, it is a security framework that can identify attack behavior based on attack pattern analysis to improve the detection of intelligent attacks. This data can be used to develop multiple threat models and methodologies. In addition, MITRE ATT&CK released "MITRE ATT&CK for Enterprise," targeting IT systems. In this framework, 224 attack techniques are categorized into 14 attack tactics.
MITRE FiGHT [34,35] is another knowledge-based security framework. It was derived from the original MITRE ATT&CK to complement it with attack tactics and techniques regarding the 5G network. Each attack technique is labeled as one of three types: "theoretical," "proof-of-concept (PoC)," and "observed." Most techniques in the framework are marked as "theoretical" or "PoC" based on academic research and other publicly available documents. Only some techniques are based on real-world observations and documented accordingly. This framework could be adopted in various ways, such as threat assessment, hostile emulation, and identifying gaps in security scope.
2.2.2. Bhadra Framework
The Bhadra Framework [11] is a security framework that models threats to mobile communication systems with a systematic methodology. In this framework, a total of 55 publicly known attack behaviors are classified by nine technical categories. This framework further understands the system vulnerabilities of MITRE ATT&CK, develops strict security defenses, and models unobserved attacks to consider the wide range of potential attackers. The modeling method divides the attack life cycle into three stages: attack mounting, attack execution, and attack results. First, attack mounting is a step in finding weaknesses in the target, obtaining initial access to the target, and establishing a continuous existence. Attack execution is a step in extending control from the initial access to the goal by exploiting vulnerabilities in the system. Finally, attack results are associated with information gathering and other attack impacts.
2.2.3. CONCORDIA–CMTMF
"Cybersecurity competence for research and Innovation (CMTMF)" [12] is a threat modeling framework for mobile systems, created to highlight the importance of cyber threat intelligence technology through the CONCORDIA project. CONCORDIA-CMTMF was developed to address the shortcomings of difficulty in applying the existing threat modeling frameworks, such as MITRE ATT&CK or Bhadra framework, to mobile networks. This framework combines MITRE ATT&CK's sub-frameworks like MITRE ATT&CK for enterprise/mobile/ICS. This framework is divided into 105 attack behaviors and 14 tactical categories.
3. I3TM: IoT Targeting-Threat Modeling framework
The 5G massive environment creates a myriad of attack contacts when one IoT device is infected, so we want to quickly detect attacks and block successive attacks, and the purpose of the framework is to quickly detect botnet attacks targeting IoT. Existing threat modeling frameworks were designated into Enterprise rather than IoT environment, making detailed analysis impossible. In this section, we describe the details of the proposed threat modeling framework, I3TM. Fig. 1 shows the framework configuration. Reports of botnet attacks consist of four steps. First, Botnet attack detection means the start of an attack by a botnet. This section is the section where the starting point of the attack is detected through reconnaissance, resource development, inspection section, and initial access. Second, it means the section using the I3TM framework. In order to apply the I3TM framework, it is used based on 18 Tactics and 75 Techniques. Third, it means the section that updates the I3TM framework. Update new extractions of tactics, techniques, and keywords for new botnet attacks. Finally, it is the Reporting for botnet attacks section. In this section, the botnet attack process is analyzed in detail, and botnet threat information is written. Keywords are extracted based on the botnet threat information. The keyword introduced in Appendix is applied to the I3TM framework to write the report. The framework is updated regularly, incorporating new attack techniques and feature data based on applicable cases in the Classification UI by attack type.
Fig. 1.
Suggested framework methodology diagram.
3.1. I3TM framework
The I3TM Framework is composed as shown in Fig. 2 and is divided into three upper classifications for attack flow, 18 Tactics, and 75 Techniques.
Fig. 2.
I3TM framework.
3.1.1. Attack mounting
Attack mounting summarizes the threats that may appear early stage of an attack. Attack mounting is divided into reconnaissance, resource development, infection section, and initial access.
Reconnaissance: A reconnaissance is a section that collects information necessary for an attack. The reconnaissance section is divided into active scanning, passive scanning, gathering user equipment (UE) identity information, gathering UE network information, phishing information, and social media information. Table 2 techniques distinguished and defined for reconnaissance intervals.
Table 2.
Techniques distinguished and defined for reconnaissance intervals.
Reconnaissance | Description |
---|---|
Active scanning | A scanning attack that uses network traffic to gather information directly from the victim. |
Passive scanning | A scanning attack in which an attacker sends a standard communication message to the victim and collects the necessary (public) information from the return response message. |
Gathering UE identity information | An attack that collects the personal information of the victim. |
Gathering UE network information | Attacks that gather information about the target network. |
Phishing information | An attack that tries to trick the victim into collecting or leaking information. |
Social media information | Attacks collect personal information that is exposed on social media. |
Table 2 represents the details and definitions of reconnaissance in attack mounting [[36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46]]. Active scanning is a scanning attack that directly collects information about the target using network traffic, including vulnerability-based script attacks and command applications. In active scanning, the keywords for the attack include scan, random, scanning IP blocks, and vulnerability scanning, wordlist scanning [[88], [89], [90], [91], [92]]. Passive scanning is a scanning attack in which an attacker sends a standard communication message to the target and collects the necessary and public information from the return response message. In passive scanning, the keywords associated with attack include dictionary attack, shodan, censys(ZMap), masscan [37,93,94]. Gathering UE identity information and gathering UE network information target information, including credentials of personal data such as e-mail addresses and IDs, and network data such as IP address ranges and domain names, can use the information to make other attacks. In gather UE identity information, the keywords associated with attack include identity, credentials, personal and business accounts, e-mail addresses, employee names [[95], [96], [97], [98], [99]]. In gather UE network information, the keywords associated with attack include administrative data, network domain, gather DNS, network trust dependencies, network topologies, IP addresses, network security appliances [88,[100], [101], [102], [103], [104]]. A phishing information attack is an attack in which information is collected or leaked by deceiving the target. It is an attack that uses social engineering techniques to camouflage and collect information from a specific target. In phishing information, the keywords associated with attack include phishing, spearphishing, instant messages, spearphishing messages, spearphishing service [42,[105], [106], [107]]. Social media information attack is an attack that can develop the next attack by collecting personal information exposed on social media. In social media information, the keywords associated with attack include spearphishing attachment, spearphishing link, malicious link, malicious attachment [108,109].
Resource development: Resource development is one of the attack preparation processes, which develops attack functions. Resource development is divided into development capabilities, obtain capabilities, stage capabilities, and compromise accounts.
Table 3 shows detailed items and definitions of resource development in attack mounting [12,47]. Development capabilities allow attackers to develop attack functions independently, identify development requirements, and build solutions such as malware, vulnerabilities, and self-signed certificates. In develop capabilities, the keywords associated with attack include develop capabilities exploits, malware, malware components, payloads, droppers, post-compromise tools, backdoors, packers, code signing certificates, self-signed SSL/TLS certificates, develop exploits [[110], [111], [112], [113]]. The obtain capabilities allow attackers to acquire information such as free or paid malware, software (including licenses), vulnerabilities, and certificates from other locations (e.g., download, purchase, steal) without developing an attack function. In obtain capabilities, the keywords associated with attack include download, purchase, opensource, cracked, steal [111,114,115]. Stage capabilities can upload, install, and set up attack functions, such as deploying attack functions developed or collected by attackers to the infrastructure they are using (e.g., GitHub, Pastbin, PaaS). In stage capabilities, the keywords associated with attack include upload/install/set up capabilities (upload malware/tool), install SSL/TLS certificates, drive-by target (drive-by download), malicious link, influence search engine optimization (SEO), SEO poisoning [[116], [117], [118], [119]]. Compromise accounts are a way to compromise the account of the services used by the victim (e.g., social media, e-mail, cloud). They can be compromised in various ways, including collecting credentials, purchasing credentials, and replacing certificates. In compromise accounts, the keywords associated with attack include compromise accounts, brute forcing credentials, credential dumps, social media accounts, email accounts, cloud accounts [45,[120], [121], [122], [123], [124]].
Table 3.
Distinguish and define Techniques for resource development sections.
Resource development | Description |
---|---|
Develop capabilities | Attackers develop their attack capabilities. |
Obtain capabilities | Attackers need to develop attack capabilities and collect them elsewhere. |
Stage capabilities | Attackers are using the attack capabilities they have developed or collected. |
Compromise accounts | Attacks that compromise service accounts. |
Infection section: In the infected section, it is the process of preparing the target of the attack in advance. The infection section is divided into router access, smartphone/app access, and removable media access.
Table 4 shows detailed items and definitions of infection intervals in attack mounting. The infection section is divided into router access, smartphone, application access, and removable media access [[48], [49], [50]]. Router access is an attack that can be accessed by infection through a wireless/wireless network to obtain access to a router, smartphone, and app access is an attack that can be accessed by infection through a smartphone or application. It is possible to connect by controlling IoT devices through applications. In router access, the keywords associated with attack include Wi-Fi, IEEE 802.11, wired LAN, wireless router [[125], [126], [127]]. In smart phone/APP access the keywords associated with attack include market, Android, IOS, System apps, APK [[128], [129], [130]]. Removable media access is an attack that can be accessed as an infection through a port connected to a secure digital (SD) card or universal serial bus (USB). In removable media access, the keywords associated with attack include USB, SD card [50,131].
Table 4.
Techniques distinguished and defined for infection section intervals.
Infection section | Description |
---|---|
Router access | Infection over a wireless/wired network to gain access to the router. |
Smartphone/app access | Infection via smartphone or application. |
Removable media access | Infection via removable media. |
Initial access: In the initial access section, it attempts actions such as direct file execution of the target through malware. Initial approaches are classified into exploiting public-facing applications, installing insecure or malicious, masquerading as legitimate applications, exploiting through removable media, insider attacks/human errors, and firmware overwrite.
Table 5 shows the detailed items and definitions of the initial approach in attack mounting [51,52]. An exploit public-facing application is an attack that uses software, data, and commands to exploit vulnerabilities in computers or programs connected to the internet to cause abnormal behavior. In exploit public facing application, the keywords associated with attack include Internet-facing computer, advantage of a weakness, glitch, design vulnerability, escape to host, web server [[132], [133], [134], [135]]. Install insecure or malicious is an attack that installs unsafe or malicious settings, installed through phishing e-mail or text messages, including direct attachments or web links to settings, and disguised to install settings through social engineering attacks. In install insecure or malicious, the keywords associated with attack include install insecure configuration, install malicious configuration [136,137]. Masquerade as legitimate application is an attack that distributes malware after disguising it as a standard application, inserting malware into an actual standard application, or pretending to be a standard program. When requesting access to the accessibility service through the corresponding process, there is a possibility that access rights may be granted to the disguised application. In masquerade as legitimate application, the keywords associated with attack include masquerading, masquerade, app stores, legitimate application [[138], [139], [140]]. Exploit through removable media is an attack that exploits or copies malware onto a device connected via removable media. By manipulating or tampering with the firmware source code of the removable media with malware, the attack can be executed when the removable media is connected. In exploit through removable media, the keywords associated with attack include charging station, USB connect, intercepting(calls), network traffic, device physical location, radio interface, SMS parser, vulnerable sim cards [[141], [142], [143], [144], [145]]. Insider attacks and human errors are attacks in which attackers use internal personnel to damage network components. Insiders include employees with security awareness, whistleblowers, and former employees vulnerable to social engineering attacks. In insider attacks and human errors, the keywords associated with attack include intentional attacks, unintentional mistakes, insiders, insiders bring, former employees, whistleblowers [11,146,147]. A firmware overwrite is an attack in which an attacker forcibly updates modulated firmware after it is overwritten or replaced with existing firmware. In firmware overwrite, the keywords associated with attack include firmware(update), overwrite, boot, replacement attack [[148], [149], [150]].
Table 5.
Techniques distinguished and defined for initial access intervals.
Initial access | Description |
---|---|
Exploiting public-facing applications | Attackers use vulnerabilities in internet-connected computers or programs to use software, data, and commands to cause abnormal behavior. |
Installing insecure or malicious | Installing insecure or maliciously configured settings. |
Masquerading as legitimate applications | Disguise malware as a legitimate application and distribute it. |
Exploiting through removable media | Attackers can exploit or copy malware onto devices connected via removable media and move it to the device. |
Insider attacks/human errors | A method by which an attacker compromises network components through the internal structure of a target. |
Firmware overwrite | An attack in which an attacker overwrites or replaces tampered firmware with older firmware and then updates (or forces) it. |
3.1.2. Attack execution
Attack execution identifies the process through which an attack is executed. Attack execution is divided into process execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, and command and control.
Process execution: It is a process for an attacker to execute malware through a local or remote system. The execution section is divided into scheduled tasks, command-line (CMD) interface, NodeB component manipulation, eNodeB component manipulation, and gNodeB component manipulation.
Table 6 shows the details and definitions for the access execution method of attack execution [51,[53], [54], [55]]. Scheduled tasks are a feature that abuses the ability to schedule tasks to facilitate the initial or repeated execution of malware Utilities exist within all major operating systems that allow programs or scripts to be scheduled to run at a specified date and time and can also schedule tasks on remote systems if proper authentication is met. In scheduled task, the keywords associated with attack include at, cron, launched, scheduled task, system timers, container orchestration job [50,[151], [152], [153], [154]]. The command-line interface is the ability to execute malicious behavior through the command prompt (CMD) interface. In command-line interface, the keywords associated with attack include CMD [234]. Other features include NodeB component manipulation, which attacks third-generation cellular base stations. In NodeB component manipulation, the keywords associated with attack include NodeB 3G [235]. eNodeB component manipulation attacks fourth-generation cellular base stations, and gNodeB component manipulation attacks fifth-generation cellular base stations. In eNodeB component manipulation, the keywords associated with attack include eNodeB, 4G, LTE [236]. In gNodeB component manipulation, the keywords associated with attack include gNodeB, 5G, NR [237].
Table 6.
Techniques distinguished and defined for process execution intervals.
Process execution | Description |
---|---|
Scheduled tasks | Abuses the ability to schedule tasks or jobs to facilitate the initial or repeated execution of malware. |
Command-line interface | Malicious actions can be executed via the CMD interface. |
NodeB component manipulation | 3G mobile communication base station for component corruption attack. |
eNodeB component manipulation | 4G mobile communication LTE base station eNodB component corruption attack. |
gNodeB component manipulation | 5G New Radio (NR) Base Station gNodB component corruption attacks on 5G mobile communications. |
Persistence: Persistence is the process of maintaining an attack. It can be a malicious file created by the attacker or an attack that continuously performs malicious behavior. Persistence processes include boot or logon autostart execution and foreground persistence.
Table 7 shows the details and definitions for the persistence method of attack execution [[56], [57], [58], [59], [60], [61]]. Boot or logon autostart execution is an attack method configuring system settings to automatically run a program during system boot or logon to maintain persistence or gain high-level privileges on a compromised system. In boot or logon autostart execution, the keywords associated with attack include autostart, autoplay, autorun, logon, boot [140,155,156]. Foreground persistence allows a malicious application to exploit the startforeground() API method to continue running in the foreground while providing notifications to the user that appear to be legitimate applications. In foreground persistence, the keywords associated with attack include startforeground [238].
Table 7.
Techniques distinguished and defined for persistence intervals.
Persistence | Description |
---|---|
Boot or logon autostart execution | Configure system settings to automatically run programs during system boot or logon to maintain persistence or gain a high level of privileges on compromised systems. |
Foreground persistence | Continue to run malicious applications in the foreground using the startforeground() application programming interface (API) method to provide users with notifications pretending to be genuine applications. |
Privilege escalation: Privilege escalation is when an attacker exploits system vulnerabilities and misconfigurations to gain elevated privileges on a system or network. Privilege escalation is categorized into code injection, stealing protocol information, stealing the key, and stealing a certificate.
Table 8 shows the details and definitions for the privilege escalation method of attack execution [[62], [63], [64]]. Code injection is an attack that inserts or executes arbitrary code into the user interface to evade defenses, elevate privileges, or mimic user interaction. In code injection, the keywords associated with attack include DLL injection, portable executable injection, hijacking, asynchronous procedure call injection, TLS callback, proc memory, extra window memory injection, process hollowing, list planting [132,[157], [158], [159], [160], [161], [162], [163]]. Stealing protocol information is an attack that steals protocol information to cause traffic congestion through command and control. In stealing protocol information, the keywords associated with attack include protocol impersonation, protocol tunneling, application layer protocol, ARP, DNS, FTP, IMAP, POP3, SIP, SMB, SMTP, SNMP, SSH, telnet, VNC [[164], [165], [166], [167], [168], [169]]. Stealing the key is a method of exploiting a vulnerability by stealing cryptographic key information. In stealing the key, the keywords associated with attack include encryption key [170]. Stealing a certificate attacks a vulnerability by stealing certificate information. In stealing a certificate, the keywords associated with attack include digital certification [171].
Table 8.
Techniques distinguished and defined for privilege escalation intervals.
Privilege escalation | Description |
---|---|
Code injection | Inject or execute arbitrary code in the user interface to evade defenses, escalate privileges, and mimic user interactions. |
Stealing protocol information | After stealing protocol information, an attacker can cause traffic congestion through command and control. |
Stealing the key | A vulnerability attack can be carried out by stealing encryption key information. |
Stealing a certificate | Attackers exploit the vulnerability by stealing certificate information. |
Defense evasion: Defense evasion is part of the attack that allows the attacker to evade or manipulate the secured part of the attack to perform additional attacks. Defense evasion is categorized into Masquerading, disguising root/jailbreak indicators, evading analysis environment, obfuscating files or information, geofencing, and remote shutdown devices.
Table 9 shows the details and definitions of the defense evasion method of attack execution [65]. Masquerading is an attack that manipulates the functionality of an artifact to attempt to make it appear legitimate or harmless to users or security tools and is manipulated for evasion or to cause abuse. It includes manipulating metadata or tricking a user into misidentifying a file type and giving it a legitimate task or service name. In masquerading, the keywords associated with attack include invalid code signature, right-to-left override, rename system utilities, masquerade task or service, match legitimate name or location, space after filename, double file extension, rename [53,[172], [173], [174], [175], [176], [177]]. Disguise root/jailbreak indicators is an attack that attempts to evade detection by mobile security programs by jailbreaking or rooting a mobile device. Compromised device detection is performed by searching for specific artifacts, but the binary can be renamed to evade detection. In disguise root/jailbreak indicators, the keywords associated with attack include rooting, jailbreak [178,179]. Evade analysis environment is a method of detecting and evading virtualization and analysis environments, such as checking for the presence of an artifact representing a virtual machine environment (VME) or sandbox and then changing its behavior. In evade analysis environment, the keywords associated with attack include system checks, virtualization/sandbox evasion [180,181]. Obfuscated files or information is a method of encrypting, encoding, or obfuscating content on a system or in transit to make navigating or analyzing files challenging. Geofencing is an attack where an attacker uses geolocation to restrict specific malicious behavior. In obfuscated files or information, the keywords associated with attack include binary padding, software packing, steganography, compile after delivery, indicator removal from tools, html smuggling, dynamic API resolution, stripped payloads, embedded payloads [[182], [183], [184], [185], [186], [187], [188], [189], [190]]. Attackers can use the API to automatically trigger specific actions when a device enters or leaves a specified radius around a geographic location. In geofencing, the keywords associated with attack include GPS, LBS, geographic [191,192]. A remote shutdown device is an attack where the attacker aims to disrupt access to a system or destroy it by shutting it down or rebooting it. Attackers can be done by wiping the master boot record (MBR), rebooting the system, or using a scheduled system to cause a shutdown or reboot. In shutdown remote device, the keywords associated with attack include system restart, system shutdown, device restart, device shutdown [[193], [194], [195], [196]].
Table 9.
Techniques distinguished and defined for defense evasion intervals.
Defense evasion | Description |
---|---|
Masquerading | Attempts to appear legitimate or harmless to users or security tools by manipulating the artifact's functionality. |
Disguise root/jailbreak indicators | Avoid detection by mobile security programs by jailbreaking or rooting mobile devices. |
Evade analysis environment | Detect and prevent virtualization and analytics environments. |
Obfuscating files or information | Encrypt, encode, or obfuscate content on systems or in transit to make files challenging to navigate or analyze. |
Geofencing | Attackers can use geographic locations to restrict specific malicious actions. |
Remote shutdown device | System access through shutdown or reboot may be interrupted, or the system may be destroyed. |
Credential Access: Credential access is where an attacker can access sensitive data by making authentication look legitimate. Credentials include uniform resource identifier hijacking and access to sensitive data in device logs.
Table 10 shows the details and definitions for the credential access method of attack execution [66,67]. Uniform resource identifier hijacking is an attack that intercepts sensitive data by registering a uniform resource identifier (URI). In uniform resource identifier hijacking, the keywords associated with attack include token, hijacking, URI [132,197]. Access sensitive data in device logs is an attack that uses a malicious application to obtain private keys, passwords, credentials, or sensitive data stored in a device's system logs. In access sensitive data in device logs, the keywords associated with attack include read_logs [239].
Table 10.
Techniques distinguished and defined for credential access intervals.
Credential access | Description |
---|---|
Uniform resource identifier hijacking | Registering URIs to intercept sensitive data. |
Access sensitive data in device logs | Malicious applications with READ_LOGS permission can be used to obtain private keys, passwords, other credentials, or other sensitive data stored in the device's system log. |
Discovery: Discovery is the section that explores and collects related information for further damage after the attack. Exploration is categorized into system network connections discovery, UE knocking, and gather victim host information: internal resource search.
Table 11 shows the details and definitions for the discovery method of attack execution [66,68,69]. System network connections discovery is a method that attempts to obtain a list of network connections to the compromised system or remote systems accessed to get information over the network. In system network connections discovery, the keywords associated with attack include netstat, state, Wi-Fi info, Internet connection discovery [[198], [199], [200], [201]]. UE knocking is a method that uses knocking on the user's device to determine the results via syn, ack. In UE knocking, the keywords associated with attack include knocking [240]. Gather victim host information: internal resource search is a method of obtaining sensitive data by searching the internal resources of the victim of an attack. In gather victim host information: internal resource search, the keywords associated with attack include victim [241].
Table 11.
Techniques distinguished and defined for discovery intervals.
Discovery | Description |
---|---|
System network connections discovery | Attempts to obtain a list of network connections with compromised or remote systems. |
UE knocking | Check the recovery result of syn, ack by using knocking on the user's device. |
Gather victim host information internal resource search | Obtain sensitive data by searching the internal. |
Lateral Movement: Internal propagation is where an attack takes place after an attack to cause additional damage based on information gathered from detection. Two types of internal propagation are Adversary in the Middle Attack and Abusing Interworking functionalities.
Table 12 shows the details and definitions for the lateral movement method of attack execution [70]. An adversary in the middle attack is an attack where an attacker manipulates between two or more network devices to gather information through network sniffing after discovery. In adversary in the middle attack, the keywords associated with attack include transmitted data manipulation, AitM [53,202,203]. Abusing interworking functionalities is an attack that exploits interworking functionalities. In abusing interworking functionalities, the keywords associated with attack include IoT application [242].
Table 12.
Techniques distinguished and defined for lateral movement intervals.
Lateral movement | Description |
---|---|
Adversary in the middle attack | Attempts to specify a location between two or more network devices |
Abusing interworking functionalities | A method of exploiting interlocking functions |
Replication through SMS | The method of replication via SMS |
Replication through Bluetooth | The method of replication via Bluetooth |
Replication through WLAN | The method of replication via WLAN |
Replication through IP | The method of replication via IP |
Collection: In the collection phase, information is collected that causes additional damage based on the internal spread. The collection section is divided into collect critical data access from device logs and collect network traffic Capture.
Table 13 shows the details and definitions for the collection method of attack execution [71]. Collect critical data Access from device logs is a method of accessing device logs to collect critical data for attacks. In collect critical data access from device logs, the keywords associated with attack include log. Collect network traffic capture collects packets through traffic capture or redirection. In collect network traffic capture, the keywords associated with attack include packet, network traffic.
Table 13.
Techniques distinguished and defined for collection intervals.
Collection | Description |
---|---|
Access sensitive data in device logs | Access device logs to gather critical data for attacks. |
Network traffic capture or redirection | Collect packets by capturing or redirecting network traffic. |
Command and Control: Command and control(C&C) is an attack an attacker uses to communicate with and control a system inside the target network. Command and control are categorized into application layer protocol, communication via Bluetooth, and communication via wireless local area network(WLAN).
Table 14 shows the details and definitions of command and control among the attack execution methods [72]. Application layer protocol refers to attacks that use application layer protocols to communicate. In Application layer protocol, the keywords associated with attack include web protocols [51]. Commands to the mobile device and often the results of those commands are contained within the protocol traffic between the mobile device and the server. In communication via Bluetooth, the keywords associated with attack include Bluetooth [243]. Communication with Bluetooth refers to attacks that use Bluetooth to communicate. Communication via WLAN refers to attacks that use WLAN to communicate. In communication via WLAN, the keywords associated with attack include WLAN [244].
Table 14.
Techniques distinguished and defined for command and control intervals.
Command and control | Description |
---|---|
Application layer protocol | Attackers mix with existing traffic and communicate using application layer protocols to avoid detection/network filtering. |
Communication via Bluetooth | An attack that uses Bluetooth to find a contact point. |
Communication via WLAN | An attack that uses WLAN to find a contact point. |
3.1.3. Attack result
The attack result summarizes the impact of additional attacks or damage states after an attack. Attack result is categorized into exfiltration, impact, 5G Service, legacy mobile telecommunication network, and type of botnet.
Exfiltration: Exfiltration refers to the leakage of information or compromise of a device based on information collected after an attack. Exfiltration is categorized into automated exfiltration, data encrypted, and alternate network mediums.
Table 15 shows the details and definitions of exfiltration in attack results [73,74]. Automated exfiltration refers to attacks that exfiltrate data through automated processing while collecting data, such as sensitive documents. In automated exfiltration, the keywords associated with attack include traffic duplication, C&C, alternative protocol, traffic mirroring [132,207,208]. When using automated exfiltration, other exfiltration techniques, such as exfiltration over C&C channels and exfiltration over alternative protocols, can also be applied to send information outside the network. Data encrypted is an attack that encrypts files stored on a mobile device to prevent users from accessing them. In data encrypted, the keywords associated with attack include ransomware, decryption key [209,210]. Identification monetary compensation from the victim in exchange for a decryption or decryption key (ransomware) or permanently making data inaccessible if the key is not stored or transmitted. Alternate Network Media is an attack that uses out-of-band data to communicate with a compromised device. In alternate network mediums, the keywords associated with attack include out of band data, evading network traffic monitoring [211].
Table 15.
Techniques distinguished and defined for exfiltration intervals.
Exfiltration | Description |
---|---|
Automated exfiltration | Attackers can exfiltrate data, such as sensitive documents, through automated processing after collection. |
Data encrypted | Attackers encrypt files stored on mobile devices to prevent users from accessing them |
Alternate network Mediums | An attacker could use out-of-band data to communicate with a compromised device. |
Impact: Impact means that the attacker causes much damage through additional attacks after the attack. The impact is categorized into data manipulation, endpoint DoS, generate traffic from the victim, jamming or DoS, and location tracking.
Table 16 shows the details and definitions of impact in attack results [75,76]. Data manipulation allows an attacker to threaten data integrity by inserting, deleting, and manipulating data to influence external results or hide activities. In data manipulation, the keywords associated with attack include stored data manipulation, transmitted data manipulation, runtime data manipulation [53]. Endpoint DoS allows an attacker to degrade or block the availability of a service to users by exhausting the service's system resources and causing it to crash. DoS attacks are used to further malicious behavior. In endpoint DoS, the keywords associated with attack include OS exhaustion flood, service exhaustion flood, application exhaustion flood, application or system exploitation [132,196,212,213]. Generate traffic from the victim allows an attacker to generate outbound traffic to a device. In generate traffic from victim, the keywords associated with attack include mobile manipulate external outcome, carrier billing fraud, fraudulent ads, general web traffic [[214], [215], [216]]. This can be used to manipulate external results, such as fraudulent payments from carriers or manipulating rankings or ratings in app stores. Jamming or DoS allows an attacker to block a mobile device's communication by jamming radio signals to reduce or block availability. Jamming or DoS allows an attacker jamming wireless signals to block communications on a mobile device to reduce or block availability. In jamming or DoS, the keywords associated with attack include degrade resources, block resources, device restart/shutdown, reaction to other events [[217], [218], [219]]. Location tracking enables an attacker to track the physical location of a target using the target's standard operating system APIs or to bypass them. In location tracking, the keywords associated with attack include remote device management services, track the location of mobile, impersonate SS7 nodes, lack of authentication in signaling system network nodes [220].
Table 16.
Techniques distinguished and defined for impact intervals.
Impact | Description |
---|---|
Data manipulation | Attackers can manipulate data to affect external results or to hide activity, threatening the integrity of the data. |
Endpoint DoS | Attackers can reduce or block service availability to users. |
Generate traffic from the victim | Attackers can generate outbound traffic that scams mobile carriers or sends fake SMS. |
Jamming or DoS | Attackers can perform DoS attacks to reduce or block resource availability. |
Location tracking | Attackers can track the target's physical location using the target's standard operating system API. |
5G Service: 5G service is used when an attack targets 5G infrastructure. The main areas of 5G services are categorized. 5G service is categorized into smart home, smart factory, digital healthcare, smart vehicle, besides that.
Table 17 shows the details and definitions of 5G service in attack result [2,[77], [78], [79]]. Smart homes connect you to the various appliances in your home and allow you to remotely control gas, heat, air conditioning, control lighting, and more. It means an attack that targets it. In smart home, the keywords associated with attack include resource constraints, absence of authentication method [221]. The smart factory is a field where sensors are installed on device and machines to collect and analyze data in real-time to analyze and control the situation in the factory. It is possible to freely link data between the pre-and post-processes of the smart factory and check issues in each section of the production site. It means an attack that targets it. In smart factory, the keywords associated with attack include machine to machine (M2M) communication, lack of security monitoring by access point name (APN) [222]. Digital healthcare is a field that deals with information, devices, systems, and platforms related to personal health and medical care. Doctors and medical institutions, and individuals can freely exchange medical services. It can be accessed through smartphones, medical measurement accessories, and healthcare-related applications. This means attacks against them. In digital healthcare, the keywords associated with attack include hacking protected health information (PHI) [[223], [226]]. A smart vehicle refers to a connected, networked car that provides various services. It is a field that deals with realizing autonomous driving while giving different information about the vehicle. It involves safe autonomous driving or driving assistance functions and exchanging information about the car and traffic flow. It refers to attacks that target these. In smart vehicle, the keywords associated with attack include traceability attack, user impersonation attack, fails to support session key establishment, fails to provide third party authentications [224,225]. In addition to smart energy IoT solutions, various fields such as delivery and agriculture be applied in the future. The division will be subdivided when it is expanded. In besides that, etc., the keywords associated with attack include smart energy, delivery, agriculture [245].
Table 17.
Techniques distinguished and defined for 5G service intervals.
5G Service | Description |
---|---|
Smart Home | Smart homes leverage a high level of connectivity, but constraints on resources and threats can arise where unauthorized communication protocols are used. |
Smart Factory | Smart factories can provide incorrect data between control systems based on communication between devices, and incorrect data can pose threats at endpoints. |
Digital Healthcare | Digital healthcare can threaten data forgery and tampering with healthcare systems. |
Smart Vehicle | The smart vehicle may obtain a session key by impersonating a user of the smart means of transportation or identifying the location of the means of transportation, resulting in a threat. |
Besides that | In addition to smart energy IoT solutions, various fields such as delivery and agriculture are being applied in the future, and when expanding, the division is subdivided. |
External Interval: External interval refers to the interconnection zone of the attack target and the range that contains the attack target since the attack occurred. The external interval sections are divided into legacy mobile telecommunication network, 5G vertical provider, internet service provider, and internet network manager.
Table 18 shows the details and definitions of Legacy Mobile Telecommunication Network in Attack Result. Legacy Mobile Telecommunication Network refers to attacks that can occur due to vulnerabilities to IP-based attacks due to the unenforced security of legacy mobile telecommunication networks. In legacy mobile telecommunication network, the keywords associated with attack include distributed and uncoordinated security mechanisms, lack of adaptation, overprovisioned security mechanisms, vulnerability to IP-based attacks [226]. 5G Vertical Provider refers to a 5G vertical service that extends the functionality of mobile telecommunications services to the business-to-business (B2B) area and provides specialized services by introducing various functions of 5G to mobile telecommunications and other existing vertically integrated industries. In 5G vertical provider, the keywords associated with attack include network function virtualization (NFV) and network slicing, management and orchestration software [227]. Internet Service Provider Vulnerabilities, such as insecure IoT systems, can be exponentially amplified in a 5G environment, and ISPs can fall victim to them. Internet Network Manager Internal network administrators can be further victimized by higher-level administrators who manage the network after an attack. In Internet service provider, the keywords associated with attack include difficulty with network address and port translation (NAPT), multiple attacks allowing remote code execution, ISP [228,246].
Table 18.
Techniques distinguished and defined for external interval.
External Interval | Description |
---|---|
Legacy mobile telecommunication network | Unapplied security of legacy mobile networks leads to vulnerabilities against IP-based attacks. |
5G vertical provider | It refers to providing specialized services by introducing various functions of 5G to telecommunications and other vertically integrated industries. |
Internet service provider | Vulnerabilities such as insecure IoT systems can amplify exponentially in a 5G environment. |
Internet network manager | Internal network managers have the potential for additional damage through higher-level administrators who have managed the network since the attack occurred. |
Type of Botnet: Type of botnet refers to the type of botnet attack. Type of botnet consists of IRC botnet, P2P botnet, HTTP botnet, DGA botnet, and Wireless botnet.
Table 19 shows the details and definitions of the Type of botnet in Attack Result [[80], [81], [82], [83], [84], [85]]. IRC botnet refers to a botnet that uses the IRC protocol, and the bot master controls the vertical and horizontal scanning. In IRC botnet, the keywords associated with attack include agobot, botmaster controlled horizontal and vertical scanning, TCP, IRC [81,229]. P2P botnet means a botnet that uses peer-to-peer communication and performs centralized control. In P2P botnet, the keywords associated with attack include centralized control, blackbox techniques, UDP [48,230]. HTTP botnet is a botnet that uses the HTTP protocol and uses a C&C server. In HTTP botnet, the keywords associated with attack include encrypted communication channel, HTTP [231,232]. DGA botnet is a botnet that uses a wholesaler generation algorithm (DGA) to avoid IPS. In DGA botnet, the keywords associated with attack include evade IPS, whitelist, blacklist, DGA [82,233]. Wireless botnet is a botnet that utilizes wireless networks and can be attacked by exploiting wireless network vulnerabilities. In wireless botnet, the keywords associated with attack include access points, wireless DoS (WDoS), MAC vulnerabilities, wireless [85].
Table 19.
Techniques distinguished and defined for type of botnet intervals.
Type of botnet | Description |
---|---|
IRC botnet | A botnet using the IRC protocol. |
P2P botnet | A botnet that uses peer-to-peer communication. |
HTTP botnet | A botnet using the HTTP protocol |
DGA botnet | A botnet that uses the Domain Creation Algorithm (DGA) |
Wireless botnet | A botnet using a wireless network |
3.2. Deriving countermeasures through I3TM
Based on I3TM framework, we can easily respond to newly observed botnet attacks. Deriving countermeasures against attacks largely consists of three steps: extracting keywords, writing report, and drawing countermeasures.
3.2.1. Extracting keywords
Botnet conducts adversarial behaviors through multiple steps. If we can capture the characteristics of the steps, it is easily revealed what kind of botnet is. For this, we characterize the botnet with relevant keywords. Based on our exhaustive research on various previously reported botnets, we prepared a reference (see Appendix A) which contains various keywords reflecting botnet's nature. Our keyword reference is built with same TTP structures of I3TM framework. That means if analyst identifies specific tactics and techniques for observed botnet, analyst just selects proper keywords in corresponding TTP category. If there is no suitable keyword in the category, it is allowed to extend the reference by adding a new keyword.
3.2.2. Writing report
Based on the analysis result, we write a report summarizing the botnet's characteristics. Fig. 3 depicts a sample report format. One can adopt any report format other than Fig. 3. But we recommend that the report include at least the following information: botnet's basic information, flow diagram, TTP, vulnerabilities-and-targets, and keywords. Basic information could include botnet's behavioral features (including name) such as device access and damage (Attack case in Fig. 3); Flow diagram should describe botnet's attack flow (Attack process in Fig. 3); TTP represents specific adversarial tactics and techniques used by botnet (Service, Device, and Network section in Fig. 3); For the known botnet attack, analyst may identify vulnerabilities exploited by botnet and their targets (vulnerabilities, CVE, and target equipment in Fig. 3); Report contains keywords which are extracted in previous step. All these information makes understanding botnet easier.
Fig. 3.
Attack analysis Reporting form.
3.2.3. Drawing countermeasures
Finally, we derive countermeasures against observed botnet based on the report, which is written in previous step. Basically, this paper focuses on the constructing the novel threat modeling framework suitable for botnet attacks in IoT environments. But this framework can be employed for drawing countermeasures against botnet attack. Since the analysis report includes detailed information of botnet, we can match proper strategies for detection or migration with corresponding attack behaviors. Because of scoping of this study, we do not present reference for countermeasures. But analyst can draw proper countermeasures from other threat modeling frameworks such as MITRE ATT&CK and D3FEND [247]. Note that I3TM framework do not share same TTPs with MITRE frameworks. Therefore, analyst should put in some effort to match I3TM framework's TTPs with MITRE frameworks' TTPs. We leave this as an open problem and will address it in the next study.
3.3. Probability-based prediction and scenario analysis
In this section, we introduce the probabilistic models used to predict Tactics and Techniques in IoT botnet attacks. The models calculate the likelihood of specific attack tactics based on extracted keywords from reports, enhancing the I3TM framework's ability to respond effectively to ongoing attacks. The likelihood of specific tactics being used in an IoT botnet attack is calculated using the following equation.
(1) |
Where is the probability of a specific Tactic , is the weight of the keyword , is the conditional probability of given and represents a keyword (specific terms or phrases) extracted from attack reports used to identify and analyze relevant tactics. The weight is determined using term frequency-inverse document frequency (TF-IDF), which calculates the importance of each keyword based on its frequency within the document and its rarity across multiple reports. By analyzing this probability, as shown in Eq. 1, I3TM can provide a more accurate forecast of the attack's progression, allowing for timely responses. This model can be implemented using various natural language processing (NLP) techniques, such as TF-IDF, to determine the significance of each keyword by calculating its frequency in the attack reports relative to its rarity across multiple reports [248]. Word2Vec helps capture semantic relationships between keywords by representing them as vectors in a continuous space [249]. Bidirectional encoder representations from transformers (BERT) provides deep contextual analysis by considering the bidirectional relationships between words, thereby helping to understand the full context of the attack [250]. In this context, BERT is used to train Eq (1), allowing it to predict the most likely tactic based on the given keyword inputs. By leveraging BERT's ability to understand the bidirectional relationships between words, it plays a crucial role in predicting the tactic that is most relevant to the attack scenario. Additionally, the model incorporates a scenario analysis framework to predict potential attack pathways by evaluating the expected number of occurrences of an event during a botnet attack, allowing for the calculation of the expected attack scenario using the following formula.
(2) |
Where is the expected number of attack events, is the probability of event occurring. By using this probabilistic scenario analysis model, the framework can predict potential attack pathways, enabling better preparation and response to IoT botnet attacks.
4. Case study
This section shows the process of attack reports of attack cases and a case study with Medusa botnets that have occurred since 2022.
4.1. Case-based application methods – Medusa Botnet
This section shows an example of creating an attack analysis report based on a report for application to a written framework. We analyze botnet threat information or methods and use them in threat modeling frameworks.
4.1.1. Medusa Botnet
In 2023, the Medusa botnet, a variant of the Mirai botnet, was discovered. When executed, the Mirai botnet connects to the C&C server, retrieves the file "medusa_stealer.sh", and executes it [86,87]. The Medusa botnet receives commands from the C&C server to perform malicious methods such as DDoS, ransomware, and brute force attacks. The Medusa botnet launches DDoS using a spoofed IP address or the IP address of the victim computer where the client is installed. It uses the Spoofer() function to generate random Ip addresses, making it difficult for victims to determine the origin of the DDoS. The Medusa botnet uses the MedusaRansomware() function to encrypt files. The Medusa botnet can also use the scanworld function to perform brute-force attacks against Telnet services on Internet-connected devices. It listens for the "FivemBackdoor" and "ssh login" commands to allow backdoor access and SSH login attempts. The send_data() function collects various information about the system and sends it to a remote server located at "hxxps://medusa-stealer[.]cc/add/bot". The send_data() function internally calls the all_data_system() function to collect information such as username, hostname, IP address, operating system, CPU and RAM usage, total number of CPU cores, and system unique identifier.
keyword: Scan, Brute forcing credentials, Telnet, SSH, Ransomware, Brute Forcing, DDoS, Flooding.
4.1.2. Attack analysis report - Medusa Botnet
Apply the Medusa botnet to the attack analysis report and configure it, as shown in Fig. 4 The Medusa botnet is not showing any attacks or victimizations and is currently defined as a threat of possible attacks through code analysis.
Fig. 4.
Medusa botnet applied to attack analysis report.
4.1.3. I3TM framework - Medusa Botnet
Fig. 5 shows the application of the Medusa botnet keyword based metrics (Appendix A) to the threat modeling framework.
Fig. 5.
Threat modeling framework applied to medusa botnet.
4.2. Comparative Analysis of threat modeling framework attacks
We compare I3TM framework with existing framework [251] for Medusa botnet. Company C represents the analysis results for Medusa botnet based on MITRE ATT&CK for enterprise as shown in Fig. 6.
Fig. 6.
Existing framework Medusa Botnet MITRE ATT&CK Application.
In this work, two attack techniques (discovery and command-and-control) were derived. On the other hand, seven corresponding attack techniques were identified through I3TM framework (Fig. 7).
Fig. 7.
Comparative Analysis of existing framework based on Medusa Botnet and the presentation method of this paper.
5. Discussion
We proposed a botnet-based threat modeling framework for 5G massive IoT networks, utilizing a keyword-based detection method. The effectiveness of this approach was validated through the analysis of the Medusa botnet, employing our Attack Analysis Report and the I3TM framework. The proposed framework offers a foundational step toward improving IoT botnet attack detection and serves as a significant contribution to the broader field of botnet-based threat modeling for 5G IoT environments. Our framework analyzed the Tactics, Techniques, and Keywords associated with six representative botnets: Mirai, Hajime, IoT Reaper, Satori, Pink, and Mozi. Additionally, we evaluated four major threat modeling frameworks (MITRE ATT&CK, MITRE FiGHT, Bhadra Framework, and CMTMF) to benchmark our approach and validate the I3TM framework's unique contributions. One of the main limitations of our study lies in the need for periodic updates to the generated keywords. As IoT botnet attacks evolve, new keywords, tactics, and techniques must be continuously added. The keywords presented in this study, while drawn from existing attack literature, will require further updates based on real-time attack analyses. Furthermore, the limited number of keywords currently available might reduce objectivity until more data is accumulated, potentially influencing the consistency of analysis. Another limitation is the necessity to adjust the framework when encountering new attack methods, requiring the development of new keywords and tactics accordingly. Although we referenced additional tactics and techniques from MITRE ATT&CK, CMTMF, and the Bhadra Framework, continuous research into emerging attacks remains necessary to maintain the relevance of the I3TM framework. Additionally, we suggest using the framework to derive keywords that detect attacks objectively, minimizing analysts' subjective biases. Our analysis of the Medusa botnet through the I3TM framework demonstrated that we could identify seven key tactics used in the attack. Further studies are needed to explore log-based detections, refine fast and effective attack detection methods, and propose concrete countermeasures. In this paper, we introduced MITRE ATT&CK and D3FEND as potential countermeasures, but this remains an open research question requiring additional investigation. To the best of our knowledge, this study is the first to propose a threat modeling framework specifically tailored for IoT, marking a significant contribution to the field. Future work will focus on refining the framework and further validating it through real-world IoT attack scenarios.
6. Conclusion and future work
This paper presents a threat modeling framework for botnets targeting the IoT. In particular, we aim to provide a unified framework for analyzing security threats that target or use the IoT and present a methodology for applying the framework. Many touchpoints are connected when an attack against the IoT occurs, and much damage can be caused. After an attack is detected, a quick response is required to minimize the damage, and we aim to analyze common patterns and trends in attacks. In this paper, we propose an I3TM framework that derives keywords for detecting attacks when they occur and judges them from an objective rather than an analyst's subjective position. The keywords proposed in this paper are based on six cases of botnets before 2021 and other referenced documents and reports and should be continuously updated for additional attacks. The research on the response direction is currently proposed based on MITRE ATT&CK's Mitigation. Still, it remains an additional future work direction to respond to IoT. We also consider additional log-based detection analysis through the framework or specifying a fast and effective detection method when an attack is detected as additional research.
CRediT authorship contribution statement
Hojun Jin: Writing – review & editing, Writing – original draft, Project administration, Methodology, Investigation, Conceptualization. GyuHyun Jeon: Resources. Hee Won Aneka Choi: Writing – review & editing. Seungho Jeon: Writing – review & editing, Validation, Supervision. Jung Taek Seo: Validation, Supervision.
Declaration of competing interest
The authors declare the following financial interests/personal relationships which may be considered as potential competing interests:Jung Taek Seo reports financial support was provided by institute for information and communication technology planning and evaluation. - This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No.2021-0-00493, 5G Massive Next Generation Cyber Attack Deception Technology Development)
Jung Taek Seo reports financial support was provided the Korea Foundation of Nuclear Safety.- This work was supported by the Korea Foundation of Nuclear Safety (KoFONS) grant funded by the Nuclear Safety and Security Commission (NSSC) of the Republic of Korea (RS-2021-KN051410, Development of cyber incident response assessment technology for critical digital assets of nuclear power plant).
Acknowledgements
This work was partly supported by the Nuclear Safety Research Program through the Korea Foundation of Nuclear Safety (koFONS) using the financial resource granted by the Nuclear Safety and Security Commission (NSSC) of the Republic of Korea (RS-2021-KN051410, Development of cyber incident response assessment technology for critical digital assets of nuclear power plant (NPP), 90%), and Institute of Information & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210493, 5G Massive Next Generation Cyber attack Deception Technology Development, 10%).
Contributor Information
Hojun Jin, Email: jin41784@naver.com.
GyuHyun Jeon, Email: pengchan88@gachon.ac.kr.
Hee Won Aneka Choi, Email: chw1226@gachon.ac.kr.
Seungho Jeon, Email: shjeon90@gachon.ac.kr.
Jung Taek Seo, Email: seojt@gachon.ac.kr.
Appendix A. Threat Modeling Framework Keyword-Based Metrics
Table A1 shows the keywords applicable to the I3TM framework in this thesis as objective metrics for Tactic. The keywords are derived from papers, reports, etc. This indicator extracts the keywords that applied the attack analyzed report based on the attack cases before 2021, and newly generated keywords should be added through additional attacks or cases.
Table. A1.
Keyword-based Threat Modeling Framework
Tactics | Techniques | Keyword | Ref | Identifier | |||||
---|---|---|---|---|---|---|---|---|---|
Attack Mounting | Reconnaissance | Active scanning | Scan | Random | Scanning IP blocks | Vulnerability scanning | Wordlist scanning | [[88], [89], [90], [91], [92]] | [A-1] |
Passive scanning | Dictionary attack | Shodan | Censys (ZMap) | Masscan | [37,93,94] | [A-2] | |||
Gather UE identity information | Identity | Credentials | Personal and business accounts | E-mail addresses | Employee names | [[95], [96], [97], [98], [99]] | [A-3] | ||
Gather UE network information | Administrative data | Network domain | Gather DNS | Network trust dependencies | Network topologies | [88,[100], [101], [102], [103], [104]] | [A-4] | ||
IP addresses | Network security appliances | ||||||||
Phishing information | Phishing | Spearphishing | Instant messages | Spearphishing messages | Spearphishing service | [42,[105], [106], [107]] | [A-5] | ||
Spearphishing attachment | Spearphishing link | Malicious link | Malicious attachment | ||||||
Social media information | Social engineering | Phishing | Social media platform | Public information | [108,109] | [A-6] | |||
Resource development | Develop capabilities | Develop capabilities exploits | Malware | Malware components | Payloads | Droppers | [[110], [111], [112], [113]] | [B-1] | |
Post-compromise tools | Backdoors | Packers | Code signing certificates | Self-signed SSL/TLS certificates | |||||
Develop exploits | |||||||||
Obtain capabilities | Download | Purchase | Opensource | Cracked | Steal | [111,114,115] | [B-2] | ||
Stage capabilities | Upload/Install/Set up capabilities (upload malware/tool) | Install SSL/TLS certificates | Drive-by target (Drive-by download) | Malicious link | Influence search engine optimization (SEO) | [119] | [B-3] | ||
SEO poisoning | |||||||||
Compromise accounts | Compromise accounts | Brute forcing credentials | Credential dumps | Social media accounts | Email accounts | [45,[120], [121], [122], [123], [124]] | [B-4] | ||
Cloud accounts | |||||||||
Infection Section | Router access | Wi-Fi | IEEE 802.11 | Wired LAN | Wireless router | [[125], [126], [127]] | [C-1] | ||
Smart phone/APP access | Market | Android | IOS | System apps | APK | [[128], [129], [130]] | [C-2] | ||
Removable media access | USB | Sd card | [50,131] | [C-3] | |||||
Initial Access | Exploit public facing application | Internet-facing computer | Advantage of a weakness | Glitch | Design vulnerability | Escape to host | [[132], [133], [134], [135]] | [D-1] | |
Web server | |||||||||
Install insecure or malicious | Install insecure configuration | Install malicious configuration | [136,137] | [D-2] | |||||
Masquerade as legitimate application | Masquerading | Masquerade | App stores | Legitimate application | [[138], [139], [140]] | [D-3] | |||
Exploit through removable media | Charging station | USB connect | Intercepting (calls) | Network traffic | Device physical location | [[141], [142], [143], [144], [145]] | [D-4] | ||
Radio interface | SMS parser | Vulnerable SIM cards | |||||||
Insider attacks and human errors | Intentional attacks | Unintentional mistakes | Insiders | Insiders bring | Former employees | [11,146,147] | [D-5] | ||
Whistleblowers | |||||||||
Firmware overwrite | Firmware (update) | Overwrite | Boot | Replacement attack | [[148], [149], [150]] | [D-6] | |||
AttackExecution | Process execution | Scheduled task | At | Cron | Launched | Scheduled task | System timers | [50,[151], [152], [153], [154]] | [E−1] |
Container orchestration job | |||||||||
Command-line interface | CMD | [234] | [E−2] | ||||||
NodeB component manipulation | NodeB | 3G | [235] | [E−3] | |||||
eNodeB component manipulation | eNodeB | 4G | LTE | [236] | [E−4] | ||||
gNodeB component manipulation | gNodeB | 5G | NR | [237] | [E−5] | ||||
Persistence | Boot or logon autostart execution | Autostart | Autoplay | Autorun | Logon | Boot | [140,155,156] | [F-1] | |
Foreground persistence | Startforeground | [238] | [F-2] | ||||||
Privilege escalation | Code injection | DLL injection | Portable executable injection | Hijacking | Asynchronous procedure call injection | TLS callback | [132,[157], [158], [159], [160], [161], [162], [163]] | [G-1] | |
Proc memory | Extra window memory injection | Process hollowing | List planting | ||||||
Stealing protocol information | Protocol impersonation | Protocol tunneling | Application layer protocol | ARP | DNS | [[164], [165], [166], [167], [168], [169]] | [G-2] | ||
FTP | IMAP | POP3 | SIP | SMB | |||||
SMTP | SNMP | SSH | Telnet | VNC | |||||
Stealing the key | Encryption key | [170] | [G-3] | ||||||
Stealing a certificate | Digital certification | [171] | [G-4] | ||||||
Defense evasion | Masquerading | Invalid code signature | Right-to-left override | Rename system utilities | Masquerade task or service | Match legitimate name or location | [53,[172], [173], [174], [175], [176], [177]] | [H-1] | |
Space after filename | Double file extension | Rename | |||||||
Disguise root/jailbreak indicators | Rooting | Jailbreak | [178,179] | [H-2] | |||||
Evade analysis environment | System checks | Virtualization /Sandbox evasion |
[180,181] | [H-3] | |||||
Obfuscated files or information | Binary padding | Software packing | Steganography | Compile after delivery | Indicator removal from tools | [[182], [183], [184], [185], [186], [187], [188], [189], [190]] | [H-4] | ||
HTML smuggling | Dynamic API resolution | Stripped payloads | Embedded payloads | ||||||
Geofencing | GPS | LBS | Geographic | [191,192] | [H-5] | ||||
Shutdown remote device | System restart | System shutdown | Device restart | Device shutdown | [[193], [194], [195], [196]] | [H-6] | |||
Credential access | Uniform resource identifier hijacking | Token | Hijacking | URI | [132,197] | [I-1] | |||
Access sensitive data in device logs | READ_LOGS | [239] | [I-2] | ||||||
Discovery | System network connections discovery | Netstat | State | WIFI info | Internet connection discovery | [[198], [199], [200], [201]] | [J-1] | ||
UE knocking | Knocking | [240] | [J-2] | ||||||
Gather victim host information: internal resource search | Victim | [241] | [J-3] | ||||||
Lateral Movement | Adversary in the middle attack | Transmitted data manipulation | AitM | [53,202,203] | [K-1] | ||||
Abusing interworking functionalities | IoT application | [242] | [K-2] | ||||||
Replication through SMS | SMS | [204] | [K-3] | ||||||
Replication through Bluetooth | Bluetooth | [204] | [K-4] | ||||||
Replication through WLAN | WLAN | [205] | [K-5] | ||||||
Replication through IP | IP | [206] | [K-6] | ||||||
Collection | Collect critical data access from device logs | Log | [L-1] | ||||||
Collect network traffic capture | Packet | Network traffic | [L-2] | ||||||
Command and Control | Application layer protocol | Web Protocols | [51] | [M − 1] | |||||
Communication via Bluetooth | Bluetooth | [243] | [M − 2] | ||||||
Communication via WLAN | WLAN | [244] | [M − 3] | ||||||
Attack Result | Exfiltration | Automated exfiltration | Traffic duplication | C&C | Alternative protocol | Traffic mirroring | [132,207,208] | [N-1] | |
Data encrypted | Ransomware | Decryption key | [209,210] | [N-2] | |||||
Alternate network mediums | Out of band data | Evading network traffic monitoring | [211] | [N-3] | |||||
Impact | Data manipulation | Stored data manipulation | Transmitted data manipulation | Runtime data manipulation | [53] | [O-1] | |||
Endpoint DoS | OS exhaustion flood | Service exhaustion flood | Application exhaustion flood | Application or system exploitation | [132,196,212,213] | [O-2] | |||
Generate traffic from victim | Mobile manipulate external outcome | Carrier billing fraud | Fraudulent ads | General web traffic | [[214], [215], [216]] | [O-3] | |||
Jamming or DoS | Degrade resources | Block resources | Device restart/shutdown | Reaction to other events | [[217], [218], [219]] | [O-4] | |||
Location tracking | Remote device management services | Track the location of mobile | Impersonate SS7 nodes | Lack of authentication in signaling system network nodes | [220] | [O-5] | |||
5G Service | Smart home | Resource constraints | Absence of authentication method | [221] | [P-1] | ||||
Smart factory | Machine to machine (M2M) communication | Lack of security monitoring by access point name (APN) | [222] | [P-2] | |||||
Digital healthcare | Hacking protected health information (PHI) | [226] | [P-3] | ||||||
Smart vehicle | Traceability attack | User impersonation attack | Fails to support session key establishment | Fails to provide third party authentications | [224,225] | [P-4] | |||
Besides that, etc. | Smart energy | Delivery | Agriculture | [245] | [P-5] | ||||
Legacy Mobile Telecommunication Network | Legacy mobile telecommunication network | Distributed and uncoordinated security mechanisms | Lack of adaptation | Overprovisioned security mechanisms | Vulnerability to IP-based attacks | [226] | [Q-1] | ||
5G vertical Provider | Network function virtualization (NFV) and network slicing | Management and orchestration software | [227] | [Q-2] | |||||
Internet service provider | Difficulty with network address and port translation (NAPT) | Multiple attacks allowing remote code execution | ISP | [228,246] | [Q-3] | ||||
Type of botnet | IRC botnet | Agobot | Botmaster controlled horizontal and vertical scanning | TCP | IRC | [81,229] | [R-1] | ||
P2P botnet | Centralized control | Blackbox techniques. | UDP | [48,230] | [R-2] | ||||
HTTP botnet | Encrypted communication channel | HTTP | [231,232] | [R-3] | |||||
DGA botnet | Evade IPS | Whitelist | Blacklist | DGA | [82,233] | [R-4] | |||
Wireless botnet | Access points | Wireless DoS (WDoS) | MAC vulnerabilities | Wireless | [85] | [R-5] |
References
- 1.Lee I.G., Go K., Lee J.H. Battery draining attack and defense against power saving wireless LAN devices. Sensors. 2020;20(7):2043. doi: 10.3390/s20072043. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Humayun M., Hamid B., Jhanjhi N.Z., Suseendran G., Talib M.N. 5G network security issues, challenges, opportunities and future directions: a survey. J. Phys. Conf. 2021;1979(1) doi: 10.1002/9781118867464.ch9. [DOI] [Google Scholar]
- 3.Costin A., Zaddach J. Iot malware: comprehensive survey, analysis framework and case studies. BlackHat USA. 2018;1(1):1–9. [Google Scholar]
- 4.Zhang X., Upton O., Beebe N.L., Choo K.K.R. IoT botnet forensics: a comprehensive digital forensic case study on mirai botnet servers. Forensic Sci. Int.: Digit. Invest. 2020;32 doi: 10.1016/j.fsidi.2020.300926. [DOI] [Google Scholar]
- 5.Kambourakis G., Kolias C., Stavrow A. MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) IEEE; 2017. The mirai botnet and the IoT zombie armies; pp. 267–272. [DOI] [Google Scholar]
- 6.Xing Y., Shu H., Kang F. PeerRemove: an adaptive node removal strategy for P2P botnet based on deep reinforcement learning. Comput. Secur. 2023;128 doi: 10.1016/j.cose.2023.103129. [DOI] [Google Scholar]
- 7.Gwarzo Z., Anyaiwe D., Olawoyin R., Tawalbeh L., Zohdy M., Allaf Z. Integrated effecient approach to botnet detection using supervised machine learning. 2023. [DOI]
- 8.Valdez-Cruz F.J., Rabelo L., Ballestas A. 2022 International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM) IEEE; 2022. System dynamics to analyze malware for IOT-based smart grids; pp. 954–957. [DOI] [Google Scholar]
- 9.Christensen T., Mandavilli S.B., Wu C.Y. 2022. "The Dark Side of the Internet of Vehicles: A Survey of the State of IoV and its Security Vulnerabilities”. arXiv preprint arXiv:2211.05775. [Google Scholar]
- 10.Kim D., Kim Y., Ahn M.K., Lee H. Automated cyber threat emulation based on ATT&CK for cyber security training. Journal of the Korea Society of Computer and Information. 2020;25(9):71–80. doi: 10.9708/jksci.2020.25.09.071. [DOI] [Google Scholar]
- 11.Rao S.P., Chen H.Y., Aura T. Threat modeling framework for mobile communication systems. 2020. arXiv:2005.05110. [DOI]
- 12.Santos B., Barriga L., Dzogovic B., Hassan I., Feng B., Jacot N., Do V.T., Do T.V. 2022 International Wireless Communications and Mobile Computing (IWCMC) Dubrovnik; Croatia: 2022. Threat modelling for 5G networks; pp. 611–616. [DOI] [Google Scholar]
- 13.Jeon Y.H. A study on the security modeling of internet of things(IoT) Journal of KIIT. 2017;15(12):17–27. doi: 10.14801/jkiit.2017.15.12.17. [DOI] [Google Scholar]
- 14.Ali I., Ahmed A.I.A., Almogren A., Raza M.A., Shah S.A., Khan A., Gani A. Systematic literature review on IoT-based botnet attack. IEEE Access. 2020;8:212220–212232. doi: 10.1109/ACCESS.2020.3039985. [DOI] [Google Scholar]
- 15.Zhao H., Shu H., Xing Y. The 2nd International Conference on Computing and Data Science. 2021. A review on IoT botnet"; pp. 1–7. [DOI] [Google Scholar]
- 16.Vignau B., Khoury R., Hallé S. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) IEEE; 2019. 10 Years of IoT malware: a feature-based taxonomy; pp. 458–465. [DOI] [Google Scholar]
- 17.Antonakakis M., April T., Bailey M., Bernhard M., Arbor A., Bursztein E., Cochran J., Durumeric Z., Halderman J.A., Arbor A., Invernizzi L., Kallitsis M., Kumar D., Lever C., Ma Z., Mason J., Menscher D., Seaman C., Sullivan N., Thomas K., Zhou Y. 26th {USENIX} Security Symposium ({USENIX} Security 17) 2017. Understanding the mirai botnet; pp. 1093–1110. ISBN 978-1-931971-40-9. [Google Scholar]
- 18.Kambourakis G., Kolias C., Stavrou A. MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) 2017. The mirai botnet and the IoT zombie armies; pp. 267–272. Baltimore, MD, USA. [DOI] [Google Scholar]
- 19.Donno M.D., Dragoni N., Giaretta A., Spognardi S. DDoS-capable IoT malwares: comparative analysis and Mirai investigation. Secur. Commun. Network. 2018:1–30. doi: 10.1155/2018/7178164. 2018. [DOI] [Google Scholar]
- 20.Borys A., Kamruzzaman A., Thakur H.N., Brickley J.C., Ali M.L., Thakur K. 2022 IEEE World AI IoT Congress (AIIoT) 2022. An evaluation of IoT DDoS cryptojacking malware and mirai botnet; pp. 725–729. Seattle, WA, USA. [DOI] [Google Scholar]
- 21.Gallopeni G., Rodrigues B., Franco M., Stiller B. 2020 IFIP Networking Conference (Networking), Paris, France. 2020. A practical analysis on mirai botnet traffic; pp. 667–668. ISBN 978-3-903176-28-7. [Google Scholar]
- 22.Stephen H., Katura H., George H., Richard R., Dave L. Network and Distributed Systems Security (NDSS) Symposium. 2019. Measurement and analysis of Hajime, a peer-to-peer IoT botnet.https://par.nsf.gov/biblio/10096257 Retrieved from. [DOI] [Google Scholar]
- 23.Edwards S., Profetis I. Hajime: analysis of a decentralized internet worm for IoT devices. Rapidity Networks. 2016;16:1–18. [Google Scholar]
- 24.Feng X., Liao X.J., Wang X.F., Wang H.N., Li Q., Yang K., Zhu H.S., Sun L.M. SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium. 2019. Understanding and securing device vulnerabilities through automated bug report analysis. ISBN 978-1-939133-04-5. [Google Scholar]
- 25.Jung W.S., Zhao H.Y., Sun M.L., Zhou G. IoT botnet detection via power consumption modeling. Smart Health. 2020;15 doi: 10.1016/j.smhl.2019.100103. [DOI] [Google Scholar]
- 26.Hwang S.Y., Kim J.N. A malware distribution simulator for the verification of network threat prevention tools. Sensors. 2021;21:6983. doi: 10.3390/s21216983. 21. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Trajanovski T., Zhang N. An automated and comprehensive framework for IoT botnet detection and analysis (IoT-BDA) IEEE Access. 2021;9:124360–124383. doi: 10.1109/access.2021.3110188. [DOI] [Google Scholar]
- 28.Blaise A., Bouet M., Conan V., Secci S. Detection of zero-day attacks: an unsupervised port-based approach. Comput. Network. 2020;180 doi: 10.1016/j.comnet.2020.107391. [DOI] [Google Scholar]
- 29.Xu Y., Koide H., Vargas D.V., Sakurai K. 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) IEEE; 2018. Tracing MIRAI malware in networked system; pp. 534–538. [DOI] [Google Scholar]
- 30.Wang B., Sang Y., Zhang Y., Li S., Xu X. 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2022. A longitudinal measurement and analysis study of Mozi, an evolving P2P IoT botnet; pp. 117–122. Wuhan, China. [DOI] [Google Scholar]
- 31.Sahota J., Vlajic N. 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2021. Mozi IoT malware and its botnets: from theory to real-world observations; pp. 698–703. Las Vegas, NV, USA. [DOI] [Google Scholar]
- 32.Rajesh P., Alam M., Tahernezhadi M., Monika A., Chanakya G. 2022 International Conference on Intelligent Data Science Technologies and Applications (IDSTA) IEEE; 2022. Analysis of cyber threat detection and emulation using MITRE attack framework; pp. 4–12. [DOI] [Google Scholar]
- 33.Georgiadou A., Mouzakitis S., Askounis D. Assessing MITRE ATT&CK risk using a cyber-security culture framework. Sensors. 2021;21(9):3267. doi: 10.3390/s21093267. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 34.Wheeler T., Simpson D. Brookings; 2022. 5G Is Smart, Now Let's Make it Secure. [Google Scholar]
- 35.Payne P., Flowler R. CSIAC; 2022. CSIAC TECHNICAL INQUIRY (TI) RESPONSE REPORT. [Google Scholar]
- 36.Fleck D., Stavrou A., Kesidis G., Nasiriani N., Shan Y., Konstantopoulos T. 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan. 2018. "Moving-Target defense against botnet reconnaissance and an adversarial coupon-collection model; pp. 1–8. [DOI] [Google Scholar]
- 37.Rae J.S., Chowdhury M.M., Jochen M. 2019 IEEE International Conference on Electro Information Technology (EIT) 2019. Internet of things device hardening using Shodan.io and ShoVAT: a survey; pp. 379–385. Brookings, SD, USA. [DOI] [Google Scholar]
- 38.Liu J., Xiao Y., Ghaboosi K., Deng H., Zhang J. Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J. Wirel. Commun. Netw. 2009:1–11. doi: 10.1155/2009/692654. (2009) [DOI] [Google Scholar]
- 39.Alladi T., Chamola V., Sikdar B., Choo K.K.R. Consumer IoT: security vulnerability case studies and solutions. IEEE Consumer Electronics Magazine. 2020;9(2):17–25. doi: 10.1109/MCE.2019.2953740. 1. [DOI] [Google Scholar]
- 40.Džaferović E., Sokol A., Almisreb A.A., Norzeli S.M. DoS and DDoS vulnerability of IoT: a review. Sustainable Engineering and Innovation. 2019;1(1):43–48. ISSN 2712-0562. [Google Scholar]
- 41.White R., Caiazza G., Jiang C., Ou X., Yang Z., Cortesi A., Christensen H. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2019. Network reconnaissance and vulnerability excavation of secure DDS systems; pp. 57–66. Stockholm, Sweden. [DOI] [Google Scholar]
- 42.Abbas S.G., Vaccari I., Hussain F., Zahid S., Fayyaz U.U., Shah G.A., Cambiaso E. Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach. Sensors. 2021;21(14):4816. doi: 10.3390/s21144816. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 43.Saritac U., Liu X., Wang R. 2022 IEEE Delhi Section Conference (DELCON) 2022. Assessment of cybersecurity framework in critical infrastructures; pp. 1–4. New Delhi, India. [DOI] [Google Scholar]
- 44.Alevizopoulou S., Koloveas P., Tryfonopoulos C., Raftopoulou P. 2021 IEEE International Conference on Cyber Security and Resilience (CSR) 2021. Social media monitoring for IoT cyber-threats; pp. 436–441. [DOI] [Google Scholar]
- 45.Thakur K., Hayajneh T., Tseng J. Cyber security in social media: challenges and the way forward. IT Professional. 2019;21(2):41–49. doi: 10.1109/MITP.2018.2881373. [DOI] [Google Scholar]
- 46.Wojciech M., Caviglione L. Cyber reconnaissance techniques. Commun. ACM. 2021;64(3):86–95. doi: 10.1145/3418293. [DOI] [Google Scholar]
- 47.Rodriguez R.M., Xu S. Springer International Publishing; Cham: 2022. Cyber Social Engineering Kill Chain, Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers; pp. 487–504. [DOI] [Google Scholar]
- 48.Vishwakarma R., Jain A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommunication systems 73. 2020;1:3–25. doi: 10.1007/s11235-019-00599-z. [DOI] [Google Scholar]
- 49.Gopal T.S., Meerolla M., Jyostna G., Eswari P.R.L., Magesh E. 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) IEEE; 2018. Mitigating mirai malware spreading in IoT environment; pp. 2226–2230. [DOI] [Google Scholar]
- 50.Alrawi O., Lever C., Valakuzhy K., Court R., Snow K., Monrose F., Antonakakis M. USENIX Security Symposium. 2021. The circle of life: a large-scale study of the IoT malware lifecycle; pp. 3505–3522. ISBN: 978-1-939133-24-3. [Google Scholar]
- 51.Chierzi V., Mercês F. 2021 APWG Symposium on Electronic Crime Research (eCrime) IEEE; 2021. Evolution of IoT Linux malware: a MITRE ATT&CK TTP based approach; pp. 1–11. [DOI] [Google Scholar]
- 52.Sikandar H.S., Sikander U., Anjum A., Khan M.A. 022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET) IEEE; 2022. An adversarial approach: comparing windows and Linux security hardness using mitre ATT&CK framework for offensive security; pp. 22–27. [DOI] [Google Scholar]
- 53.Firoozjaei M.D., Mahmoudyar N., Baseri Y., Ghorbani A.A. An evaluation framework for industrial control system cyber incidents. International Journal of Critical Infrastructure Protection. 2022;36 doi: 10.1016/j.ijcip.2021.100487. [DOI] [Google Scholar]
- 54.Salim M.M., Singh S.K., Park J.H. Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks. Appl. Soft Comput. 2021;113 doi: 10.1016/j.asoc.2021.107859. [DOI] [Google Scholar]
- 55.Tansettanakorn C., Thongprasit S., Thamkongka S., Visoottiviseth V. 2016 Fifth ICT International Student Project Conference. ICT-ISPC); 2016. ABIS: a prototype of android botnet identification system; pp. 1–5. [DOI] [Google Scholar]
- 56.Jadhav P., Mulla A., Bhoi G., Raj S., Nambiar S. Mobile botnet detection. Int. J. Res. Appl. Sci. Eng. Technol. 2023;11:1–7. doi: 10.22214/ijraset.2023.49506. [DOI] [Google Scholar]
- 57.Ahn G., Lee S.A., Park W.H. Changes of cyber hacking attack aspect of North Korea cyber-attack groups applying MITRE ATT&CK. Research Briefs on Information and Communication Technology Evolution. 2021;7:75–88. doi: 10.22667/ReBiCTE.2021.10.05.007. [DOI] [Google Scholar]
- 58.William B. Royalholloway Technical Report. 2022. Attack mapping for IoT. [Google Scholar]
- 59.Mussa A., Daher Z., Martin B., Morgan C. 9th Annual Conf. On Computational Science & Computational Intelligence (CSCI'22) 2023. Mapping zero-click attack behavior into MITRE ATT&CK mobile: a systematic process. [Google Scholar]
- 60.Alam M.T., Bhusal D., Park Y., Rastogi N. Looking beyond IoCs: automatically extracting attack patterns from external CTI. arXiv:2211.01753. 2022 doi: 10.48550/arXiv.2211.01753. [DOI] [Google Scholar]
- 61.Santos D.R., Dagrada M., Costante E. Leveraging operational technology and the Internet of things to attack smart buildings. Journal of Computer Virology and Hacking Techniques. 2021;17(1):1–20. doi: 10.1007/s11416-020-00358-8. [DOI] [Google Scholar]
- 62.Davi L., Dmitrienko A., Sadeghi A.R., Winandy M. Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28. Springer Berlin Heidelberg; 2010. Privilege escalation attacks on android; pp. 346–360. Revised Selected Papers 13. [DOI] [Google Scholar]
- 63.Lee H.T., Kim D., Park M., Cho S.J. Protecting data on android platform against privilege escalation attack. Int. J. Comput. Math. 2016;93(2):401–414. doi: 10.1080/00207160.2014.986113. [DOI] [Google Scholar]
- 64.Park Y., Lee C., Lee C., Lim J., Han S., Park M., Cho S.J. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats. 2012. RGBDroid: a novel response-based approach to android privilege escalation attacks. [Google Scholar]
- 65.Straub J. 2020 IEEE International Conference on Smart Cloud (SmartCloud) 2020. Modeling attack, defense and threat trees and the cyber kill chain, ATT&CK and STRIDE frameworks as blackboard architecture networks; pp. 148–153. Washington, DC, USA. [DOI] [Google Scholar]
- 66.Martti L. International Conference on Cyber Warfare and Security. Academic Conferences International Limited; 2022. APT cyber-attack modelling: building a general model. 17, No. 1. [DOI] [Google Scholar]
- 67.Berady A., Jaume M., Tong V.V.T., Guette G. PWNJUTSU: a dataset and a semantics-driven approach to retrace attack campaigns. IEEE Transactions on Network and Service Management. 2022 doi: 10.1109/TNSM.2022.3183476. [DOI] [Google Scholar]
- 68.Ahmed M.G., Panda S., Xenakis C., Panaousis E. MITRE ATT&CK-driven cyber risk assessment. Proceedings of the 17th International Conference on Availability, Reliability and Security. 2022;107:1–10. doi: 10.1145/3538969.3544420. [DOI] [Google Scholar]
- 69.Jo Y., Choi O., You J., Cha Y., Lee D.H. Cyberattack models for ship equipment based on the MITRE ATT&CK framework. Sensors. 2022;22(5) doi: 10.3390/s22051860. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 70.Lasky N., Hallis B., Vanamala M., Dave R., Seliya J. Machine learning based approach to recommend MITRE ATT&CK framework for software requirements and design specifications. arXiv preprint arXiv:2302.05530. 2023 doi: 10.48550/arXiv.2302.05530. [DOI] [Google Scholar]
- 71.Manocha H., Srivastava A., Verma C., Gupta R., Bansal B. Security assessment rating framework for enterprises using MITRE ATT&CK matrix. arXiv preprint arXiv:2108.06559. 2021 doi: 10.48550/arXiv.2108.06559. [DOI] [Google Scholar]
- 72.Al-Kadhimi A.A., Singh M.M., Jabar T. 8th International Conference on Computational Science and Technology: ICCST 2021, Malaysia. 2022. Fingerprint for mobile-sensor APT detection framework (FORMAP) based on tactics techniques and procedures (TTP) and MITRE; pp. 515–533. [DOI] [Google Scholar]
- 73.Ullah F., Edwards M., Ramdhany R., Chitchyan R., Babar M.A., Rashid A. Data exfiltration: a review of external attack vectors and countermeasures. J. Netw. Comput. Appl. 2018;101:18–54. doi: 10.1016/j.jnca.2017.10.016. [DOI] [Google Scholar]
- 74.Mundt M., Baier H. Digital Forensics and Cyber Crime: 12th EAI International Conference. Proceedings; 2021. Towards mitigation of data exfiltration techniques using the MITRE ATT&CK framework; pp. 139–158. [DOI] [Google Scholar]
- 75.Choi S., Yun J.H., Min B.G. Cyber Security Experimentation and Test Workshop. 2021. Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets; pp. 41–48. [DOI] [Google Scholar]
- 76.Toker F.S., Akpinar K.O., Özçelik I. 2021 9th International Symposium on Digital Forensics and Security (ISDFS) 2021. MITRE ICS attack simulation and detection on EtherCAT based drinking water system; pp. 1–6. [DOI] [Google Scholar]
- 77.Mantas G., Komninos N., Rodriguez J., Logota E., Marques H. Security for 5G communications. Fundamentals of 5G mobile networks. 2015:207–220. https://onlinelibrary.wiley.com/doi/10.1002/9781118867464.ch9 [Google Scholar]
- 78.Ho T.M., Tran T.D., Nguyen T.T., Kazmi S.M., Le L.B., Hong C.S., Hanzo L. Next-generation wireless solutions for the smart factory, smart vehicles, the smart grid and smart cities. arXiv preprint arXiv:1907.10102. 2019 doi: 10.48550/arXiv.1907.10102. [DOI] [Google Scholar]
- 79.Zhang S., Zhang N., Zhou S., Gong J., Niu Z., Shen X. Energy-sustainable traffic steering for 5G mobile networks. IEEE Commun. Mag. 2017;55(11):54–60. doi: 10.1109/MCOM.2017.1700022. [DOI] [Google Scholar]
- 80.Heo S.D., Lee M.S., Yoon H.S. Korean Information Science Society Conference, Korean Institute of Information Scientists and Engineers. 2010. A survey of botnet detection; pp. 72–76. 1598-5164(pISSN) [Google Scholar]
- 81.Zhu Z., Lu G., Chen Y., Fu Z.J., Roberts P., Han K. Computer Software and Applications Conference. IEEE; 2008. Botnet research survey; pp. 967–972. [DOI] [Google Scholar]
- 82.Liao W.H., Chang C.C. 2010 International Conference on Internet Technology and Applications, IEEE. 2010. Peer to peer botnet detection using data mining scheme; pp. 1–4. [DOI] [Google Scholar]
- 83.Mac H., Tran D., Tong V., Nguyen L.G., Tran H.A. Proceedings of the 8th International Symposium on Information and Communication Technology. 2017. DGA botnet detection using supervised learning methods; pp. 211–218. [DOI] [Google Scholar]
- 84.Buriachok V., Sokolov V. Using 2.4 GHz wireless botnets to implement denial-of-service attacks. arXiv preprint arXiv:1902.08425. 2019 doi: 10.31435/rsglobal_wos/12062018/5734. [DOI] [Google Scholar]
- 85.Farooq M.J., Zhu Q. Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans. Inf. Forensics Secur. 2019;14(9):2412–2426. doi: 10.1109/TIFS.2019.2898817. [DOI] [Google Scholar]
- 86.BleepingComputer Bill Toulas. Medusa botnet returns as a Mirai-based variant with ransomware sting. 2023. https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/
- 87.Cyble blog A botnet capable of performing DDoS, ransomware, and bruteforce attacks. 2023. https://blog.cyble.com/2023/02/03/new-medusa-botnet-emerging-via-mirai-botnet-targeting-linux-users/
- 88.Guo H., Heidemann J. Detecting IoT devices in the internet. IEEE/ACM Trans. Netw. 2020;28(5):2323–2336. doi: 10.1109/tnet.2020.3009425. [DOI] [Google Scholar]
- 89.Bignau B., Khoury R., Hallé S., Hamou-Lhadj A. The evolution of IoT Malwares, from 2008 to 2019: survey, taxonomy, process simulator and perspectives. J. Syst. Architect. 2021;116 doi: 10.1016/j.sysarc.2021.102143. [DOI] [Google Scholar]
- 90.Dainotti A., King A., Claffy K., Papale F., Pescapé A. Proceedings of the 2012 Internet Measurement Conference. 2012. Analysis of a “/0” stealth scan from a botnet; pp. 1–14. [DOI] [Google Scholar]
- 91.Su Y.R., Li X.F., Wang S.F., Yi J., He H.R. DEStech Transactions on Computer Science and Engineering cimns; 2017. Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices. [DOI] [Google Scholar]
- 92.Saputro E.D., Purwanto Y., Ruiawan M.F. 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS) IEEE; 2021. Medium interaction honeypot infrastructure on the internet of things; pp. 98–102. [DOI] [Google Scholar]
- 93.Haseeb J., Mansoori M., Welch I. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE; 2020. A measurement study of IoT-based attacks using IoT kill chain; pp. 557–567. [DOI] [Google Scholar]
- 94.Verma S., Kawamoto Y., Kato N. GLOBECOM 2020-2020 IEEE Global Communications Conference. IEEE; 2020. A novel IoT-aware WLAN environment identification for efficient internet-wide port scan; pp. 1–6.https://10.1109/GLOBECOM42002.2020.9348199 [Google Scholar]
- 95.Malik V., Singh S. Security risk management in IoT environment. J. Discrete Math. Sci. Cryptogr. 2019;22(4):697–709. doi: 10.1080/09720529.2019.1642628. [DOI] [Google Scholar]
- 96.Alnahari W., Quasim M.T. 2021 International Congress of Advanced Technology and Engineering (ICOTEN) IEEE; 2021. Authentication of IoT device and IoT server using security key; pp. 1–9.https://10.1109/ICOTEN52080.2021.9493492 [Google Scholar]
- 97.Mokkapati R., Dasari V.L. 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT) IEEE; 2023. An artificial intelligence enabled self replication system against cyber attacks; pp. 698–703.https://10.1109/ICSSIT55814.2023.10061089 [Google Scholar]
- 98.Subuah A., Theodrakopoulos G. Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic. Sensors. 2019;19(21):4777. doi: 10.3390/s19214777. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 99.Yadav K., Agrawal R. 2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS) IEEE; 2022. Ethical hacking and web security: approach interpretation; pp. 1382–1384.http://10.1109/ICAIS53314.2022.9742736 [Google Scholar]
- 100.Azath H., David D.B., Blessie E.C., Jayapradha A., Rani S.S. 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) IEEE; 2021. BoT-IoT based denial of service detection with deep learning; pp. 221–225.http://10.1109/I-SMAC52330.2021.9640789 [Google Scholar]
- 101.Shah Y., Sengupta S. 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) IEEE; 2020. A survey on classification of cyber-attacks on IoT and IIoT devices; pp. 406–413.http://10.1109/UEMCON51285.2020.9298138 [Google Scholar]
- 102.MITRE ATT&CK Gather victim network information: network trust dependencies. 2021. https://attack.mitre.org/techniques/T1590/003/
- 103.Yadav G., Paul K., Allakany A., Okamura K. 2020 International Conference on Information Networking (ICOIN) IEEE; 2020. IoT-PEN: a penetration testing framework for IoT; pp. 196–201.http://10.1109/ICOIN48656.2020.9016445 [Google Scholar]
- 104.MITRE ATT&CK, Gather Victim Network Information Network security appliances. 2021. https://attack.mitre.org/techniques/T1590/006/
- 105.MITRE ATT&CK Phishing for information. 2021. https://attack.mitre.org/techniques/T1598/
- 106.Miloslavskaya N. Stream data analytics for network attacks' prediction. Procedia Computer Science. 2020;169:57–62. doi: 10.1016/j.procs.2020.02.114. [DOI] [Google Scholar]
- 107.Muralidharan T., Nissim N. Improving malicious email detection through novel designated deep-learning architectures utilizing entire email. Neural Network. 2023;157:257–279. doi: 10.1016/j.neunet.2022.09.002. [DOI] [PubMed] [Google Scholar]
- 108.Ghasemi M., Saadaat M., Ghollasi O. Fundamental Research in Electrical Engineering: the Selected Papers of the First International Conference on Fundamental Research in Electrical Engineering. Springer; Singapore: 2019. Threats of social engineering attacks against security of internet of things (IoT) pp. 957–968. [DOI] [Google Scholar]
- 109.Reuter C., Hughes A.L., Kaufhold M.A. Social media in crisis management: an evaluation and analysis of crisis informatics research. Int. J. Hum. Comput. Interact. 2018;34(4):280–294. doi: 10.1080/10447318.2018.1427832. [DOI] [Google Scholar]
- 110.MITRE ATT&CK Develop capabilities. 2021. https://attack.mitre.org/techniques/T1587/
- 111.Faruk M.J.H., Tasnim M., Shariar H., Valero M., Rahman A., Wu F. 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) IEEE; 2022. Investigating novel approaches to defend software supply chain attacks; pp. 283–288. [DOI] [Google Scholar]
- 112.MITRE ATT&CK Develop capabilities: digital certificates. 2021. https://attack.mitre.org/techniques/T1587/003/
- 113.Kim H., Kwon H.J., Kim K.K. Modified cyber kill chain model for multimedia service environments. Multimed. Tool. Appl. 2019;78:3153–3170. doi: 10.1007/s11042-018-5897-5. [DOI] [Google Scholar]
- 114.MITRE ATT&CK Obtain capabilities: tool. 2021. https://attack.mitre.org/techniques/T1588/002/
- 115.Cordy S. ETH Library; 2020. The Evolving Cyber Threat Landscape during the Coronavirus Crisis. [DOI] [Google Scholar]
- 116.Mazzeo G., Staffa M. TROS: protecting humanoids ROS from privileged attackers. International Journal of Social Robotics. 2020;12:827–841. doi: 10.1007/s12369-019-00581-4. [DOI] [Google Scholar]
- 117.Na Y.J., Joo Y.J., Lee H.J., Zhao X.C., Sajan K.K., Ramachandran G., Krishnamachari B. 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS) IEEE; 2020. Enhancing the reliability of IoT data marketplaces through security validation of IoT devices; pp. 265–272. [DOI] [Google Scholar]
- 118.Ashraf I., Park Y.W., Hur S.J., Kim S.W., Alroobaea R., Zikria Y.B. A survey on cyber security threats in IoT-enabled maritime industry. IEEE Trans. Intell. Transport. Syst. 2022 doi: 10.1109/TITS.2022.3164678. [DOI] [Google Scholar]
- 119.Cynthia D.S., Nathan R., Thompson J.A., Silfversten E., Paoli G.P. Rand Corporation; 2018. Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events. [DOI] [Google Scholar]
- 120.Jain A.K., Sahoo S.R., Kaubiyal J. Online social networks security and privacy comprehensive review and analysis. Complex & Intelligent Systems. 2021;7(5):2157–2177. doi: 10.1007/s40747-021-00409-7. [DOI] [Google Scholar]
- 121.Shah T., Venkatesan S. Internet of Things–ICIOT 2019: 4th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings 4. Springer International Publishing; 2019. A method to secure iot devices against botnet attacks; pp. 28–42. [DOI] [Google Scholar]
- 122.Mohamed N., Belation B. SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique. IEEE Access. 2021;9:42919–42932. doi: 10.1109/ACCESS.2021.3066289. [DOI] [Google Scholar]
- 123.Ramsdell K.A.W., Esbeck K.E. 2021. EVOLUTION OF RANSOMWARE, MITRE. [Google Scholar]
- 124.Shaikh A.A., Lyer K. International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. Springer International Publishing; 2019. Security and privacy issues in cloud computing; pp. 1299–1306. [DOI] [Google Scholar]
- 125.Sajjad S.M., Yousaf M. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) IEEE; 2018. UCAM: usage, communication and access monitoring based detection system for IoT botnets; pp. 1547–1550. [DOI] [Google Scholar]
- 126.Oh M.K., Lee S.J., Kang Y.S., Choi D.H. Wireless transceiver aided run-time secret key extraction for IoT device security. IEEE Trans. Consum. Electron. 2019;66(1):11–21. doi: 10.1109/TCE.2019.2959593. [DOI] [Google Scholar]
- 127.Wang T.B., Xia C.H., Li X.J., Xiang Y. Epidemic heterogeneity and hierarchy: a study of wireless hybrid worm propagation. IEEE Trans. Mobile Comput. 2020;21(5):1639–1656. http://10.1109/TMC.2020.3026342 [Google Scholar]
- 128.Kumar D., Shen K., Case B., Gary D., Alperovich G., Kuznetsov D., Gupta R., Durumeric Z. USENIX Security Symposium. 2019. All things considered: an analysis of IoT devices on home networks; pp. 1169–1185. ISBN: 978-1-939133-06-9. [Google Scholar]
- 129.Joshi J., Parekh C. 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring) IEEE; 2016. Android smartphone vulnerabilities: a survey; pp. 1–5. [DOI] [Google Scholar]
- 130.Ahvanooey M.T., Li Q.M., Rabbani M., Rajput A.R. A survey on smartphones security: software vulnerabilities, malware, and attacks. arXiv preprint arXiv:2001.09406. 2020 doi: 10.48550/arXiv.2001.09406. [DOI] [Google Scholar]
- 131.Obradovic D. Cybersecurity of IoT systems: analyzing security vulnerabilities in a cloud supported embedded system environment. Bachelor of Engineering: Information and Communications Technology; 2021. [Google Scholar]
- 132.Zhaid S., Mazhar M.S., Abbas S.G., Hanif Z., Hina S., Shah G.A. Threat modeling in smart firefighting systems: aligning MITRE ATT&CK matrix and NIST security controls. Internet of Things. 2023 doi: 10.1016/j.iot.2023.100766. [DOI] [Google Scholar]
- 133.MITRE ATT&CK Exploit public-facing application. 2022. https://attack.mitre.org/techniques/T1190/
- 134.MITRE ATT&CK Escape to host. 2022. https://attack.mitre.org/techniques/T1611/
- 135.Gourisetti S.N.G., Mylrea M., Ashley T., Kwon R., Castleberry J., Wright-Mockler Q., Mckenzie P., Brege G. Demonstration of the cybersecurity framework through real-world cyber attack, 2019 Resilience Week (RWS) IEEE. 2019;1:19–25. doi: 10.1109/RWS47064.2019.8971822. 1. [DOI] [Google Scholar]
- 136.Mathas C.M., Vassilakis C., Kolokotronis N., Zarakovitis C.C., Kourtis M.A. On the design of IoT security analysis of software vulnerabilities for smart grids. Energies. 2021;14(10):2818. doi: 10.3390/en14102818. [DOI] [Google Scholar]
- 137.Hasan R. 2022 IEEE International Conference on Digital Health (ICDH) IEEE; 2022. Towards strengthening the security of healthcare devices using secure configuration provenance; pp. 228–233. [DOI] [Google Scholar]
- 138.Karmakar K.K., Varadharajan V., Nepal S., Tupakula U. SDN-enabled secure IoT architecture. IEEE Internet Things J. 2020;8(8):6549–6564. doi: 10.1109/JIOT.2020.3043740. [DOI] [Google Scholar]
- 139.Zhang S.Z., Makke O., Gusikhin O., Shah A., Vasilakos A. VEHITS; 2018. A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection; pp. 379–386. [DOI] [Google Scholar]
- 140.Jabar T., Singh M.M. Exploration of mobile device behavior for mitigating advanced persistent threats (apt) A systematic literature review and conceptual framework. Sensors. 2022;22(13):4662. doi: 10.3390/s22134662. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 141.Liu H., Spolaor R., Turrin F., Bonafede R., Conti M. USB powered devices: a survey of side-channel threats and countermeasures. High-Confidence Computing. 2021;1 doi: 10.1016/j.hcc.2021.100007. 1. [DOI] [Google Scholar]
- 142.Cyber Kill Chain Commentary Exploit via charging station or PC. 2019. https://cyber-kill-chain.ch/techniques/T1458/
- 143.Khan H., Martin K.M. A survey of subscription privacy on the 5G radio interface - the past, present and future. J. Inf. Secur. Appl. 2020;53 doi: 10.1016/j.jisa.2020.102537. [DOI] [Google Scholar]
- 144.BalaGanesh D., Chakrabarti A., Midhunchakkaravarthy D. Smart devices threats, vulnerabilities and malware detection approaches: a survey. European Journal of Engineering and Technology Research. 2018;3(2):7–12. doi: 10.24018/ejeng.2018.3.2.302. [DOI] [Google Scholar]
- 145.Mc Daid C. 2021. STK, A-OK? MOBILE MESSAGING ATTACKS on VULNERABLE SIMS, VB2021 Localhost. [Google Scholar]
- 146.Zhang L.D., Zhang S.W., Chen N., Liu W.Y., Zhou X.B., Qiu T. 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) IEEE; 2022. A neuroevolution-inspired scheme for generating robust internet of things; pp. 1059–1064. [DOI] [Google Scholar]
- 147.Obert M., Harakal M. 2019 Communication and Information Technologies (KIT) IEEE; 2019. Fuzzy inference system application on high level security model; pp. 1–9. [DOI] [Google Scholar]
- 148.Gao C., Luo L., Zhang Y., Pearson B., Fu X.W. 2019 IEEE International Conference on Industrial Internet (ICII) IEEE; 2019. Microcontroller based IoT system firmware security: case studies; pp. 200–209. [DOI] [Google Scholar]
- 149.Zandberg K., Schleiser K., Acosta F., Tschofenig H., Baccelli E. Secure firmware updates for constrained iot devices using open standards: a reality check. IEEE Access. 2019;7:71907–71920. doi: 10.1109/ACCESS.2019.2919760. [DOI] [Google Scholar]
- 150.Maurya S., Rauthan M.M.S., Verma R. 2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) IEEE; 2022. Security aspects of the internet of drones (IoD) pp. 1–6. [DOI] [Google Scholar]
- 151.MITRE ATT&CK Scheduled task/job: at. 2022. https://attack.mitre.org/techniques/T1053/002/
- 152.Bahrami P.N., Dehghantanha A., Dargahi T., Parizi R.M., Choo K.K.R., Javadi H.H.S. Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics, techniques, and procedures. Journal of information processing systems. 2019;15(4):865–889. doi: 10.3745/JIPS.03.0126. [DOI] [Google Scholar]
- 153.Ahamed S., Lakshmanan R. Real-time heuristic-based detection of attacks performed on a Linux machine using osquery. SN Computer Science. 2022;3(5):405. doi: 10.1007/s42979-022-01288-6. [DOI] [Google Scholar]
- 154.Ying F., Zhao S.J., Deng H. Microservice security framework for IoT by mimic defense mechanism. Sensors. 2022;22(6):2418. doi: 10.3390/s22062418. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 155.MITRE ATT&CK Boot or logon autostart execution. 2022. https://attack.mitre.org/techniques/T1547/
- 156.Villalón-Huerta A., Marco-Gisbert H., Ripoll-Ripoll I. A taxonomy for threat actors' persistence techniques. Comput. Secur. 2022;121 doi: 10.1016/j.cose.2022.102855. [DOI] [Google Scholar]
- 157.Kim J.W., Shin J.H., Seo J.T. Detection and blocking method against DLL injection attack using PEB-LDR of ICS EWS in smart IoT environments. J. Internet Technol. 2022;23(4):875–888. doi: 10.53106/160792642022072304022. [DOI] [Google Scholar]
- 158.Sharma A., Gupta B.B., Singh A.K., Saraswat V.K. Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. Comput. Secur. 2022;115 doi: 10.1016/j.cose.2022.102627. [DOI] [Google Scholar]
- 159.Liu J.B., Zhao S.J., Feng D.G., Feng W. RIPTE: runtime integrity protection based on trusted execution for IoT device. Secur. Commun. Network. 2020;2020:1–14. doi: 10.1155/2020/8957641. [DOI] [Google Scholar]
- 160.Apostolopoulos T., Katos V., Choo K.K.R., Patsakis C. Resurrecting anti-virtualization and anti-debugging: unhooking your hooks. Future Generat. Comput. Syst. 2021;116:393–405. doi: 10.1016/j.future.2020.11.004. [DOI] [Google Scholar]
- 161.Mitre A.T.T.&C.K. Process injection. Proc Memory; 2020. https://attack.mitre.org/techniques/T1055/009/ (Accessed 20 April 2023) [Google Scholar]
- 162.Yadav R.K., Karamveer K. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) IEEE; 2022. A survey on IOT botnets and their detection approaches; pp. 1901–1906. [DOI] [Google Scholar]
- 163.MITRE ATT&CK Process injection: ListPlanting. 2022. https://attack.mitre.org/techniques/T1055/015/
- 164.Morge-Rollet L., Jeune D.L., Roy F.L., Canaff C., Gautier R. Drone detection and classification using physical-layer protocol statistical fingerprint. Sensors. 2022;22(17):6701. doi: 10.3390/s22176701. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 165.MITRE ATT&CK Protocol tunneling. 2020. https://attack.mitre.org/techniques/T1572/
- 166.Tripathi N., Hubballi N. Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Comput. Surv. 2021;54(4):1–33. doi: 10.1145/3448291. [DOI] [Google Scholar]
- 167.Hwawei Most common network protocols and their vulnerabilities. https://forum.huawei.com/enterprise/en/most-common-network-protocols-and-their-vulnerabilities/thread/789301-861
- 168.MITRE ATT&CK Protocol tunneling. 2020. https://attack.mitre.org/techniques/T1572/
- 169.MITRE ATT&CK Standard application layer protocol. 2020. https://attack.mitre.org/techniques/T0869/
- 170.Cho S.H., Ko D.K., Park S.Y. Block data record-based dynamic encryption key generation method for security between devices in low power wireless communication environment of IoT. Appl. Sci. 2020;10(21):7940. doi: 10.3390/app10217940. [DOI] [Google Scholar]
- 171.Cisa AppleJeus. Analysis of North Korea's cryptocurrency malware. 2021. https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-048a
- 172.Mitre A.T.T.&C.K. Masquerading: invalid code signature. 2020. https://attack.mitre.org/techniques/T1036/001/
- 173.Kazoleas L., Karampelas P. A novel malicious remote administration tool using stealth and self-defense techniques. Int. J. Inf. Secur. 2022;21(2):357–378. doi: 10.1007/s10207-021-00559-2. [DOI] [Google Scholar]
- 174.Cozzi E., Graziano M., Fratantonio Y., Balzarotti D. 2018 IEEE Symposium on Security and Privacy (SP) IEEE; 2018. Understanding Linux malware; pp. 161–175. [DOI] [Google Scholar]
- 175.Mohamed N. State-of-the-Art in Chinese apt attack and using threat intelligence for detection. A survey. Journal of Positive School Psychology. 2022:4419–4443. [Google Scholar]
- 176.Mitre A.T.T.&C.K., Masquerading Space after filename. 2020. https://attack.mitre.org/techniques/T1036/006/
- 177.Silva J.A.H., López L.I.B., Caraguay Á.L.V., Hernández-Álvarez M. A survey on situational awareness of ransomware attacks—detection and prevention parameters. Rem. Sens. 2019;11:10. doi: 10.3390/rs11101168. [DOI] [Google Scholar]
- 178.Ashawa M., Morris S. Analysis of mobile malware: a systematic review of evolution and infection strategies. Journal of Information Security & Cybercrimes Research. 2021;4(2):103–131. doi: 10.26735/krvi8434. [DOI] [Google Scholar]
- 179.Adăscăliței I. Smartphones and IoT security. Inf. Econ. 2019;23(2):63–75. doi: 10.12948/issn14531305/23.2.2019.06. [DOI] [Google Scholar]
- 180.Nagy R., Németh K., Papp D., Buttyán L. Rootkit detection on embedded IoT devices. Acta Cybern. 2021;25(2):369–400. doi: 10.14232/actacyb.288834. [DOI] [Google Scholar]
- 181.Shahin S., Soubra H. 2022 5th International Conference on Information and Computer Technologies (ICICT) IEEE; 2022. An IoT adversary emulation prototype tool; pp. 7–12. [DOI] [Google Scholar]
- 182.Abusnaina A., Anwar A., Alshamrani S., Alabduljabbar A., Jang R., Nyang D.H., Mohaisen D. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses. 2022. Systematically evaluating the robustness of ML-based IoT malware detection systems; pp. 308–320. [DOI] [Google Scholar]
- 183.Kim K.G., Alfouzan F.A., Kim H.K. Cyber-attack scoring model based on the offensive cybersecurity framework. Appl. Sci. 2021;11(16):7738. doi: 10.3390/app11167738. [DOI] [Google Scholar]
- 184.Rallabandi S., Sundaram A.M., Karunakaran V. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) IEEE; 2022. Generating a multi-OS fully undetectable malware (FUD) and analyzing it afore and after steganography; pp. 1962–1967. [DOI] [Google Scholar]
- 185.Shaila G.S., Darki A., Faloutsos M., Abu-Ghazaleh N., Sridharan M. 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19) 2019. IDAPro for IoT malware analysis? [Google Scholar]
- 186.Gulatas I., Kilinic H.H., Zaim A.H., Aydin M.A. Malware threat on edge/fog computing environments from internet of things devices perspective. IEEE Access. 2023 doi: 10.1109/ACCESS.2023.3262614. [DOI] [Google Scholar]
- 187.MITRE ATT&CK Obfuscated files or information: HTML smuggling. 2021. https://attack.mitre.org/techniques/T1027/006/
- 188.Ajmal A.B., Khan S., Jabeen F. 2022 International Conference on Frontiers of Information Technology (FIT). IEEE. 2022. Defeating modern day anti-viruses for defense evaluation; pp. 255–260. [DOI] [Google Scholar]
- 189.MITRE ATT&CK Obfuscated files or information: stripped payloads. 2021. https://attack.mitre.org/techniques/T1027/008/
- 190.Liu T., Liu Z., Liu Q., Wen W., Xu W., Li M. Annual Computer Security Applications Conference. 2020. StegoNet: turn deep neural network into a stegomalware; pp. 928–938. [DOI] [Google Scholar]
- 191.Zahra A., Asif M., Nagra A.A., Azeem M., Gilani S.A. 2021 4th International Conference on Computing & Information Sciences (ICCIS) IEEE; 2021. Vulnerabilities and security threats for IoT in transportation and fleet management; pp. 1–5. [DOI] [Google Scholar]
- 192.Modica P.W., Loria M.P., Loria M.P., Toja M., Carchiolo V., Malgeri M. 2018 Federated Conference on Computer Science and Information Systems (FedCSIS) IEEE; 2018. A geofencing algorithm fit for supply chain management; pp. 737–746. [DOI] [Google Scholar]
- 193.Maloney M., Reilly E., Siegel M., Falco G. 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) IEEE; 2019. Cyber physical IoT device management using a lightweight agent; pp. 1009–1014. [DOI] [Google Scholar]
- 194.Choi C., Choi J. Ontology-based security context reasoning for power IoT-cloud security service. IEEE Access. 2019;7:110510–110517. doi: 10.1109/ACCESS.2019.2933859. [DOI] [Google Scholar]
- 195.Norris M., Celik Z.B., Venkatesh P., Zhao S., McDaniel P., Sivasubramaniam A., Tan G. IoTRepair: flexible fault handling in diverse IoT deployments. ACM Transactions on Internet of Things. 2022;3(3):1–33. doi: 10.1145/3532194. [DOI] [Google Scholar]
- 196.Villalón-Huerta A., Ripoll-Ripoll I., Marco-Gisbert H. CNA tactics and techniques: a structure proposal. J. Sens. Actuator Netw. 2021;10(1):14. doi: 10.3390/jsan10010014. [DOI] [Google Scholar]
- 197.Alabdan R. Phishing attacks survey: types, vectors, and technical approaches. Future Internet. 2020;12(10):168. doi: 10.3390/fi12100168. [DOI] [Google Scholar]
- 198.Sasaki T., Fujita A., Ganan C.H., Eetan M.V., Yoshioka K., Matsumoto T. 2022 IEEE Symposium on Security and Privacy (SP) IEEE; 2022. Exposed infrastructures: discovery, attacks and remediation of insecure ICS remote management devices; pp. 2379–2396. [DOI] [Google Scholar]
- 199.Kim H., Kim T., Jang D. An intelligent improvement of internet-wide scan engine for fast discovery of vulnerable IoT devices. Symmetry. 2018;10(5):151. doi: 10.3390/sym10050151. [DOI] [Google Scholar]
- 200.Li C., Cai G., Li J., Liu H., Zhang Y., Gu D., Yu Y. Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 2018. Passwords in the air: harvesting wi-fi credentials from smartcfg provisioning; pp. 1–11. [DOI] [Google Scholar]
- 201.Roy S., Sharmin N., Acosta J.C., Kiekintveld C., Laszka A. Survey and taxonomy of adversarial reconnaissance techniques. ACM Comput. Surv. 2022;55(6):1–38. doi: 10.1145/3538704. [DOI] [Google Scholar]
- 202.Hsupeng B., Lee K.W., Wei T.E., Wang S.H. 2022 24th International Conference on Advanced Communication Technology (ICACT) IEEE; 2022. Explainable malware detection using predefined network flow; pp. 27–33. [DOI] [Google Scholar]
- 203.Specht F., Otto J., Eickmeyer J. 2022 IEEE 20th International Conference on Industrial Informatics (INDIN) IEEE; 2022. Cyberattack impact reduction using software-defined networking for cyber-physical production systems; pp. 188–194. [DOI] [Google Scholar]
- 204.MITRE ATT&CK Out of band data. 2022. https://attack.mitre.org/techniques/T1644/
- 205.Gudipalli T.L., Raman R., Singh D.P., Singh D., Venkateswarlu C., Gonzáles J.L.A. 2023 International Conference on Artificial Intelligence and Smart Communication (AISC) IEEE; 2023. Gonzáles, IoT Wireless Technology using lattice-based open source public-key NTRU cryptosystem; pp. 614–617. [DOI] [Google Scholar]
- 206.Bojadzievski S., Kalenda M., Shuminoski T. Proceedings of International Conference on Applied Innovation in IT. Anhalt University of Applied Sciences; 2020. Ultra reliable advanced framework for emergency and mission critical data for 5G services; pp. 13–20. 8. No. 1. [DOI] [Google Scholar]
- 207.MITRE ATT&CK Exfiltration over C2 channel. 2023. https://attack.mitre.org/techniques/T1041/
- 208.Mitre A.T.T.&C.K., Exfiltration Automated. Traffic duplication. 2023. https://attack.mitre.org/techniques/T1020/001/
- 209.Al-Hawawreh M., Hartog F.D., Sitnikova E. Targeted ransomware: a new cyber threat to edge system of brownfield industrial internet of things. IEEE Internet Things J. 2019;6(4):7137–7151. doi: 10.1109/JIOT.2019.2914390. [DOI] [Google Scholar]
- 210.Oz H., Aris A., Levi A., Uluagac A.S. A survey on ransomware: evolution, taxonomy, and defense solutions. ACM Comput. Surv. 2022;54(11s):1–37. doi: 10.1145/3514229. [DOI] [Google Scholar]
- 211.Lai X., Jenihhin M., Raik J., Paul K. 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS) IEEE; 2019. PASCAL: timing SCA resistant design and verification flow; pp. 239–242. [DOI] [Google Scholar]
- 212.MITRE ATT&CK Endpoint denial of service: service exhaustion flood. 2023. https://attack.mitre.org/techniques/T1499/002/
- 213.Ali M.H., Jaber M.M., Abd S.K., Rehman A., Awan M.J., Damaševičius R., Bahaj S.A. Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT) Electronics. 2022;11(3):494. doi: 10.3390/electronics11030494. [DOI] [Google Scholar]
- 214.Mitre A.T.T.&C.K. Generate traffic from victim. 2023. https://attack.mitre.org/techniques/T1643/
- 215.Pooranian Z., Conti M., Haddadi H., Tafazolli R. Online advertising security: issues, taxonomy, and future directions. IEEE Communications Surveys & Tutorials. 2021;23(4):2494–2524. doi: 10.1109/COMST.2021.3118271. [DOI] [Google Scholar]
- 216.Seo J., Lee S. Abnormal behavior detection to identify infected systems using the APChain algorithm and behavioral profiling. Secur. Commun. Network. 2018;2018 doi: 10.1155/2018/9706706. [DOI] [Google Scholar]
- 217.Sanchez P.M.S., Celdran A.H., Bovet G., Perez G.M., Stiller B. SpecForce: a framework to secure IoT spectrum sensors in the internet of battlefield things. IEEE Commun. Mag. 2022 doi: 10.1109/MCOM.001.2200349. [DOI] [Google Scholar]
- 218.Kholidy H.A. Multi-layer attack graph analysis in the 5G edge network using a dynamic hexagonal fuzzy method. Sensors. 2021;22(1):9. doi: 10.3390/s22010009. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 219.Denial of Service. 2023. Mitre ATT&CK.https://attack.mitre.org/techniques/T0814/ [Google Scholar]
- 220.MITRE ATT&CK. 2023. Adversary-in-the-Middle.https://attack.mitre.org/techniques/T1557/ [Google Scholar]
- 221.Jiang J., Li Z., Tian Y., Al-nabhan N. A review of techniques and methods for IoT applications in collaborative cloud-fog environment. Secur. Commun. Network. 2020;2020:1–15. doi: 10.1155/2020/8849181. [DOI] [Google Scholar]
- 222.Laghari S.A., Manickam S., Karuppayah S. A review on SECS/GEM: a machine-to-machine (M2M) communication protocol for industry 4.0. International Journal of Electrical and Electronic Engineering & Telecommunications. 2021;10(2):105–114. doi: 10.18178/ijeetc.10.2.105-114. [DOI] [Google Scholar]
- 223.Chacko A., Hayajneh T. Security and privacy issues with IoT in healthcare. EAI Endorsed Transactions on Pervasive Health and Technology. 2018;4:14. doi: 10.4108/eai.13-7-2018.155079. [DOI] [Google Scholar]
- 224.Ali Z., Chaudhry S.A., Ramzan M.S., Al-Turjman F. Securing smart city surveillance: a lightweight authentication mechanism for unmanned vehicles. IEEE Access. 2020;8:43711–43724. doi: 10.1109/ACCESS.2020.2977817. [DOI] [Google Scholar]
- 225.Sureshkumar V., Mugunthan S., Amin R. An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network. Peer-to-Peer Networking and Applications. 2022;15:2347–2363. doi: 10.1007/s12083-022-01350-3. 5. [DOI] [Google Scholar]
- 226.Liyanage M., Abro A.B., Ylianttila M., Gurtov A. Opportunities and challenges of software-defined mobile networks in network security. IEEE security & privacy. 2016;14(4):34–44. doi: 10.1109/MSP.2016.82. [DOI] [Google Scholar]
- 227.Sun Y., Tian Z., Li M., Zhu C., Guizani N. Automated attack and defense framework toward 5G security. IEEE Network. 2020;34(5):247–253. doi: 10.1109/MNET.011.1900635. [DOI] [Google Scholar]
- 228.Brotsis S., Kolokotronis N., Limniotis K., Shiaeles S., Kavallieros D., Bellini E., Pavué C. 2019 IEEE Conference on Network Softwarization (NetSoft) IEEE; 2019. Blockchain solutions for forensic evidence preservation in IoT environments; pp. 110–114. [DOI] [Google Scholar]
- 229.Libadas C., Walsh R., Lapsley D., strayer W.T. Proceedings. 2006 31st IEEE Conference on Local Computer Networks. IEEE; 2006. Usilng machine learning technliques to identify botnet traffic; pp. 967–974. [DOI] [Google Scholar]
- 230.Wazzan M., Algazzawi D., Bamasaq D., Albeshri A., Cheng L. Internet of things botnet detection approaches analysis and recommendations for future research. Appl. Sci. 2021;11(12):5713. doi: 10.3390/app11125713. [DOI] [Google Scholar]
- 231.Goyal M., Sahoo I., Geethakumari G. 2019 International Conference on Recent Advances in Energy-Efficient Computing and Communication (ICRAECC) IEEE; 2019. HTTP botnet detection in IOT devices using network traffic analysis; pp. 1–6. [DOI] [Google Scholar]
- 232.Junges P., François F., François O. 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) IEEE; 2019. Passive inference of user actions through IoT gateway encrypted traffic analysis; pp. 7–12. ISBN:978-3-903176-15-7. [Google Scholar]
- 233.Tong V., Nguyen G. Proceedings of the 7th Symposium on Information and Communication Technology. 2016. A method for detecting DGA botnet based on semantic and cluster analysis; pp. 272–277. [DOI] [Google Scholar]
- 234.Ali M.I., Kaur S. Next-generation digital forensic readiness BYOD framework. Secur. Commun. Network. 2021;2021:1–19. doi: 10.1155/2021/6664426. [DOI] [Google Scholar]
- 235.Aljeri N., Boukerche A. Mobility management in 5G-enabled vehicular networks: models, protocols, and classification. ACM Comput. Surv. 2020;53:1–35. doi: 10.1145/3403953. 5. [DOI] [Google Scholar]
- 236.Kozma D., Soás G., Ficzere D., Varga P. 2019 15th International Conference on Network and Service Management (CNSM) IEEE; 2019. Communication challenges and solutions between heterogeneous industrial IoT systems; pp. 1–6. [DOI] [Google Scholar]
- 237.Kar S., Mishra P., Wang K. 2021 IEEE 4th 5G World Forum (5GWF) IEEE; 2021. 5G-IoT architecture for next generation smart systems; pp. 241–246. [DOI] [Google Scholar]
- 238.Zhang N., Yuan K., Naveed M., Zhou X., Wang X. 2015 IEEE Symposium on Security and Privacy. IEEE. 2015. Leave me alone: app-level protection against runtime information gathering on android; pp. 915–930. [DOI] [Google Scholar]
- 239.Chatzoglou E., Kambourakis G., Smiliotopoulos C. Let the cat out of the bag popular android IoT apps under security scrutiny. Sensors. 2022;22(2):513. doi: 10.3390/s22020513. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 240.Kolias C., Kambourakis G., Stavrou A., Voas J. DDoS in the IoT: mirai and other botnets, DDoS in the IoT: mirai and other botnets.". Computer. 2017;50:80–84. doi: 10.1109/MC.2017.201. 7. [DOI] [Google Scholar]
- 241.MITRE ATT&CK Gather victim host information. 2021. https://attack.mitre.org/techniques/T1592/
- 242.Lee E., Seo Y., Oh S., Kim Y. A survey on standards for interoperability and security in the internet of things. IEEE Communications Surveys & Tutorials. 2021;23(2):1020–1047. doi: 10.1109/COMST.2021.3067354. [DOI] [Google Scholar]
- 243.Moodi M., Ghazvini M. A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD) J. Ambient Intell. Hum. Comput. 2019;10:4579–4593. doi: 10.1007/s12652-018-1140-5. [DOI] [Google Scholar]
- 244.Özçelik M., Chalabianloo N., Gür G. 2017 IEEE International Conference on Computer and Information Technology (CIT) IEEE; 2017. Software-defined edge defense against IoT-based DDoS; pp. 308–313. [DOI] [Google Scholar]
- 245.Smys S. A survey on internet of things (IoT) based smart systems. Journal of ISMAC. 2020;2(4):181–189. doi: 10.36548/jismac.2020.4.001. [DOI] [Google Scholar]
- 246.Ogawa K., Hamamoto N. 2023 IEEE International Conference on Consumer Electronics (ICCE) IEEE; 2023. Proposal of low-cost automated security diagnosis system for IoT devices; pp. 1–3. [DOI] [Google Scholar]
- 247.MITRE DEFEND . MITRE. 2023. https://d3fend.mitre.org/ (Accessed 28 December 2023) [Google Scholar]
- 248.Jones K.S. A statistical interpretation of term specificity and its application in retrieval. J. Doc. 1972;28(1):11–21. [Google Scholar]
- 249.Mikolov T., Chen K., Corrado G., Dean J. 2013. Efficient Estimation of Word Representations in Vector Space. arXiv preprint arXiv:1301.3781. [Google Scholar]
- 250.Devlin J., Chang M.-W., Lee K., Toutanova K. Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers) 2019. BERT: pre-training of deep bidirectional transformers for language understanding; pp. 4171–4186. [Google Scholar]
- 251.New Medusa Botnet Emerging via Mirai Botnet Targeting Linux Users. CYBLE blog; 2023. https://cyble.com/blog/new-medusa-botnet-emerging-via-mirai-botnet-targeting-linux-users/ [Google Scholar]