Skip to content

Cyber-trust: the shield for IoT cyber-attacks

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  • Nicholas Kolokotronis
  • Dr Stavros Shiaeles
  • Emanuele Bellini
  • Liza Charalambous
  • Dimitris Kavallieros
  • Olga Gkotsopoulou
  • Clement Pavue
  • Alessandro Bellini
  • Gohar Sargsyan
The security problems arising from the flawed design of legacy hardware and embedded devices allow cyber-criminals to easily compromise systems and launch large-scale attacks toward critical cyber-infrastructures. The interdisciplinary approach proposed in this chapter captures different phases of such emerging attacks, before and after known or unknown (zero-day) vulnerabilities have been widely exploited by cyber-criminals to launch the attack. Emphasis is given on building a proactive cyber-threat intelligence gathering and sharing system to prevent the exploitation of vulnerabilities and design flaws found in IoT devices. This intelligence information is used to maintain accurate vulnerability profiles of IoT devices, in accordance with data protection, privacy, or other regulations, and optimally alter their attack surface to minimize the damage from cyber-attacks.
Original languageEnglish
Title of host publicationResilience and Hybrid Threats
EditorsIgor Linkov, Lada Roslycky, Benjamin D. Trump
PublisherIOS Press
Pages76-93
Number of pages17
Volume55
ISBN (Electronic)978-1-64368-023-1
ISBN (Print)978-1-64368-022-4
DOIs
Publication statusPublished - 31 Dec 2019

Publication series

NameNATO Science for Peace and Security Series - D: Information and Communication Security
PublisherIOS Press
Volume55
ISSN (Print)1874-6268
ISSN (Electronic)1879-8292

Related information

Relations Get citation (various referencing formats)

ID: 19635256