Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cyber Security in Modern Internet of Things - Systematic Review


Affiliations
1 Department of Languages and Computer Science, University of Málaga, Málaga, Spain
     

   Subscribe/Renew Journal


Technology has a speedy development nowadays. Everyone in this world uses those technologies to update themselves in order to improve their lifestyles in the upcoming years. A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for many reasons, including by original design or from poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability. Backdoors can be very hard to detect, and detection of backdoors are usually discovered by someone who has access to application source code or intimate knowledge of Operating System of the computer. This paper discusses about the DDoS attack and its risk in the network. This paper gives the awareness of the DDoS attack and its vulnerabilities occurring in the network.


Keywords

IoT, DDoS Attack, CPS.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 477

PDF Views: 1




  • Cyber Security in Modern Internet of Things - Systematic Review

Abstract Views: 477  |  PDF Views: 1

Authors

Fran Casino
Department of Languages and Computer Science, University of Málaga, Málaga, Spain
Thomas K. Dasaklis
Department of Languages and Computer Science, University of Málaga, Málaga, Spain
Constantinos Patsakis
Department of Languages and Computer Science, University of Málaga, Málaga, Spain

Abstract


Technology has a speedy development nowadays. Everyone in this world uses those technologies to update themselves in order to improve their lifestyles in the upcoming years. A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for many reasons, including by original design or from poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability. Backdoors can be very hard to detect, and detection of backdoors are usually discovered by someone who has access to application source code or intimate knowledge of Operating System of the computer. This paper discusses about the DDoS attack and its risk in the network. This paper gives the awareness of the DDoS attack and its vulnerabilities occurring in the network.


Keywords


IoT, DDoS Attack, CPS.