SL3 Flashcards
What security issues is the application layer vulnerable to?
data theft and privacy issues
Which IoT layer is more prone to data thefts?
Application layer (service)
What are the security attacks possible in the application layer? (5 attacks)
Data theft attacks: iot applications deal with large amounts of critical and private data
Access control attacks: once the access is compromised, the IoT application is vulnerable
Service interruption attacks: deprive legitimate users from using the services by artificially making the servers or network too busy to respond
Malicious code injection attacks: can infect the IoT applications with malicious self propagating attacks and then obtain or tamper with confidential data
Sniffing attacks: monitor the network traffic in IoT applications mainly targeting unencrypted communication
What are the solutions to the application layer security attacks?
Data theft attacks: data encryption, data isolation, robust user and network authentication, and privacy management
Access control attacks: secure authorization access and multi-layered identification and authentication control
Malicious code injection attacks: reliable firewall, malicious code detection and other defensive mechanisms
Sniffing attacks: lightweight but effective encryption algorithms
________ are interconnected devices that could be infected with malicious software acting as bots
Botnets
What are the 4 components of Mirai?
Bot: device that is infected and is used to infect
Command and control server: used to manage DDoS attacks
Loader: used in dissemination of bots targeting different hardware platforms
Report server: used to keep track of infected devices
What are the 7 steps of Mirai botnet operation and communication?
- Brute-force attack
- Forwards device characteristics to the report server
- Checks status of target victims and infected
- Infect command with vulnerable devices
- Malicious binary is downloaded and executed
- Attack is launched against a target server
- Bot instances will start attacking the target server
What are some of Mirai’s signatures?
- Exchanging keep-alive messages
- Generating attack traffic
- Downloading a specific type of binary code
- Sending reports that generate distinctive patterns
What other IoT botnets emerged after Mirai?
Lua Botnet: targeted Linux-based cable modems using ARM CPUs and an encrypted C&C communication channel
Hajime: Similar to Mirai but relies on fully distributed communications
Bashlite: targets Linux based systems and launches DDoS attacks