Skip to main content
. 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433

Table 9.

Application attacks with compromised security goals and countermeasures.

Application Attacks Compromised Security Requirements Effects Countermeasures
Virus and Worms ALL Resource Destruction Machine learning techniques and signature matching techniques [186], Security updates, side-channel analysis, verify software integrity, control flow, protective Software
Malicious Scripts ALL Infected Data Algebra statistics and geometric trends [187], Firewalls
Spyware and Adware ALL Resource Destruction Installing antivirus or antimalware; API call network with the heuristic detection mechanism [188], Logging and testing [173]
Trojan Horse ALL Resource Destruction Noise bound [189], Monitoring, Audit and research device and network, place IoT devices in separate segment or virtual LAN [190]
Denial of Service A, AC, AU, NR, P Network shutdown, Resource exhaustion [64] Access Control Lists
Firmware Hijacking ALL Unauthorized operation and path for other attacks [180] Electromagnetic pattern [191], use Safe programming languages, add runtime code, audit software
Botnet Attack ALL Service outage [181] Packet monitoring and feed to Enhanced Support Vector Neural Network (ESVNN) [192], Deep learning [193], Bot program in local DNS server [181]
Brute Force Password Attack ALL Sensitive data, System compromise [194] Logging attempt and frequency [195], Dynamic password change [196], Securing firmware update, cryptography methods
Phishing Attacks ALL Stage for multiple attack [197] Machine learning [197], Artificial intelligence [198], Cryptographic methods