May 22, 2017
May 30, 2017
June 5, 2017
June 12, 2017
June 19, 2017
June 26, 2017
July 5, 2017
July 11, 2017
link to the site of the IoTPOT project, a large honeypot of various IoT devices.
A data set of UDP Flood, HTTP Flood, Smurf, and other DDoS attacks on a network over time
Network data from an IoT honeypot, labeled only as either attack or not
The data set used in the Sybil attack detection paper, consists of 41 bluetooth devices' connections with other devices over the course of a tech conference.
Courtesy of: iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design
A diagram of the steps taken to perform various different attacks on a network
A diagram detailing the hierarchy of steps taken to perform a MitM attack
DATA AND FILES
Click on titles to view files/links
Info on Hidden Markov Models
Hidden Markov Model Introductions
A few presentations giving an introduction and detailing the math behind HMMs
A pdf explaining the different algorithms used in HMMs along with graphics to explain each one.
Introduces Hidden Markov Models and goes in-depth into the math behind them.
A paper detailing a Sybil attack detection method that uses semi-supervised HMMs.
Goes in-depth with mathematics behind Hidden Markov Fields and applies it all to image modeling/processing
Introduces Hidden Markov Models very well and explains the math behind them, then goes very in-depth into 2-D HMMs as applied to image processing
This is a simple video showing a visualization of how HMMs operate.
Info on IoT Attacks
Description of the four categories of IoT attacks and suggestions on how to combat vulnerabilities.
Talks about different types of IoT attacks on networks
Another paper going over the various different attacks on IoT
The main point of interest regarding this article is that it is very in depth when it comes to feature selection/extraction.
Explains vulnerabilities of IoT-Fog networks and details a few different attacks on these networks. Also gives an alternative solution to detecting these specific types of attacks
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
A paper describing the Research Center for Information and Physical Security's setup of a honeypot to capture many different attacks on IoT devices. We may end up using their data set for our research.
A paper describing Sybil attacks in IoT, we will ask the author if we could use their data sets for our own research
An article explaining security methods specifically for control/controller systems on an internet-connected network.
Other Sources of Interest
Paper corresponding to the DDoS dataset. The authors detail their collection of DDoS attack data and using it in conjunction with machine learning in order to detect DDoS attacks.
Guidelines and things to note when deciding what information to share with others over cyber security related data.
A presentation going over various honeypots useful in detecting IoT attacks, as well as results for most common types of attacks.
A good source for some free tools that can be used in network monitoring. Could also be useful in monitoring honeypot networks.
Video detailing how to analyze the data from a network to determine attacks with their corresponding features.
Article going in-depth on how to begin attacking your own network to test security, as well as to gather data on how attacks are usually carried out. Could be useful for attacking own honeypot to gather necessary data.
Examples of IoT Attacks
Fairly short article (pdf) going over some devices that are vulnerable to attacks on IoT and the different attacks that can be carried out on them.
Seeks to bring awareness to the threat of IoT attacks, expose some of the vulnerabilities that allow for such attacks to occur, and offer suggestions on how to proceed.
A DDoS attack on central heating systems during winter in Finland leave some residents without heat for a week, a potentially deadly situation given climate in Finland.
An article over a recent attack on a power company, where a group infiltrated a company's network to install malware which legitimately communicated to power systems to shut a power grid down.
This article describes a very interesting set of attacks on IoT devices where the hacker inserts malware into the subtitles of movies to then be downloaded by users with smart TVs. When the user opens the movie and uses subtitles, the malware infects the smart TV and subsequently, the user's network.
An important recent set of attacks has been those done on sites commonly used for trading bitcoin. On multiple popular sites there have been DDoS attacks with the focus of halting the ability to trade bitcoin, resulting in losses for those unable to make transactions at critical times.