Virus and Worms |
ALL |
Resource Destruction |
Machine learning techniques and signature matching techniques [186], Security updates, side-channel analysis, verify software integrity, control flow, protective Software |
Malicious Scripts |
ALL |
Infected Data |
Algebra statistics and geometric trends [187], Firewalls |
Spyware and Adware |
ALL |
Resource Destruction |
Installing antivirus or antimalware; API call network with the heuristic detection mechanism [188], Logging and testing [173] |
Trojan Horse |
ALL |
Resource Destruction |
Noise bound [189], Monitoring, Audit and research device and network, place IoT devices in separate segment or virtual LAN [190] |
Denial of Service |
A, AC, AU, NR, P |
Network shutdown, Resource exhaustion [64] |
Access Control Lists |
Firmware Hijacking |
ALL |
Unauthorized operation and path for other attacks [180] |
Electromagnetic pattern [191], use Safe programming languages, add runtime code, audit software |
Botnet Attack |
ALL |
Service outage [181] |
Packet monitoring and feed to Enhanced Support Vector Neural Network (ESVNN) [192], Deep learning [193], Bot program in local DNS server [181] |
Brute Force Password Attack |
ALL |
Sensitive data, System compromise [194] |
Logging attempt and frequency [195], Dynamic password change [196], Securing firmware update, cryptography methods |
Phishing Attacks |
ALL |
Stage for multiple attack [197] |
Machine learning [197], Artificial intelligence [198], Cryptographic methods |