A Detection of Cyber Attacks in IoT Systems
A Detection of Cyber Attacks in IoT Systems
Directed by : Supervised by :
Mme. Delfi Aya Mme. Souyah Amina (ESI)
M. Harbi Yesmine
2
Thanks
3
Abstract
4
Résumé
5
AbstractArabic
6
Contents
1 Cyber Security 12
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.1.1 Definition . . . . . . . . . . . . . . . . . . . . . . . 13
1.1.2 Usage and importance . . . . . . . . . . . . . . . . 13
1.1.3 Overview of the chapter . . . . . . . . . . . . . . . 14
1.2 Threats to cybersecurity . . . . . . . . . . . . . . . . . . . 15
1.2.1 Different types of cyber threats . . . . . . . . . . . 15
1.2.2 Statistics on cyber threats and their impact . . . . 20
1.3 Principles of Cybersecurity . . . . . . . . . . . . . . . . . . 21
1.3.1 Confidentiality, Integrity, Availability (CIA) triad . 21
1.3.2 Defence in depth stategy . . . . . . . . . . . . . . 22
1.3.3 Risks assessment and management . . . . . . . . . 23
1.4 Cybersecurity Measures and Best Practices . . . . . . . . . 23
1.4.1 Firewall and Intrusion Detection/Prevention Systems 23
1.4.2 Antivirus and Anti-malware software . . . . . . . . 24
1.4.3 Encryption . . . . . . . . . . . . . . . . . . . . . . 26
1.4.4 User authentication and access control . . . . . . . 26
1.4.5 Backup and disaster recovery . . . . . . . . . . . . 27
1.5 Cybersecurity Education and Training . . . . . . . . . . . 28
1.5.1 Importance of education and training in promoting
cybersecurity awareness . . . . . . . . . . . . . . . 28
1.5.2 Examples of cybersecurity training programs and re-
sources . . . . . . . . . . . . . . . . . . . . . . . . . 29
1.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2 Chapter02 31
7
List of Figures
8
List of Tables
9
Acronyms
10
General Introduction
11
Chapter 1
Cyber Security
12
graphicx
1.1 Introduction
1.1.1 Definition
Cybersecurity is the practice of protecting computer systems, networks,
and data from digital attacks. It involves a range of measures and
technologies designed to safeguard digital systems and data from
unauthorized access, theft, and damage. Cybersecurity threats come in
many forms, including malware, phishing scams, social engineering
attacks, and ransomware.
According to the National Institute of Standards and Technology (NIST),
cybersecurity is defined as ”the ability to protect or defend the use of
cyberspace from cyber attacks” (NIST, 2018). The Cybersecurity and
Infrastructure Security Agency (CISA) of the United States government
defines cybersecurity as ”the art of protecting networks, devices, and data
from unauthorized access or criminal use and the practice of ensuring
confidentiality, integrity, and availability of information” (CISA, 2021).
Cybersecurity is crucial for individuals, businesses, and governments
alike. For individuals, cybersecurity involves taking steps to protect
personal information and online accounts, such as using strong
passwords, enabling two-factor authentication, and being cautious when
clicking on links or downloading files. For businesses and governments,
cybersecurity is essential to protect sensitive data and intellectual
property from theft or damage. Cyber attacks can result in significant
financial losses, damage to reputation, and legal liabilities.
In conclusion, cybersecurity is a critical component of modern digital life,
and everyone has a role to play in protecting themselves and others from
cyber threats. By staying informed, taking precautions, and working
together, we can build a safer and more secure digital world.
13
contain a breach is 280 days (Accenture, 2021). Cyber attacks can also
result in significant loss of sensitive data, damage to reputation, and legal
liabilities. In addition to financial losses, cyber attacks can also have
serious consequences for national security. For example, in recent years,
several countries have been accused of carrying out cyber attacks against
other nations for political or economic gain. Cyber attacks on critical
infrastructure, such as power grids or transportation systems, can also
pose a serious threat to public safety.
To address these challenges, governments, businesses, and individuals
must prioritize cybersecurity. This includes investing in cybersecurity
technologies and personnel, educating employees and the public about
cyber threats, and developing and implementing cybersecurity policies
and regulations. In conclusion, cybersecurity is crucial in the digital age,
as cyber threats continue to evolve and become more sophisticated. By
taking proactive measures to protect ourselves and our digital systems,
we can minimize the risks of cyber attacks and build a safer and more
secure digital world.
14
education and training in promoting cybersecurity awareness. It will
provide examples of cybersecurity training programs and resources, as
well as best practices for promoting cybersecurity education in
organizations. Finally, the chapter will conclude by discussing future
trends in cybersecurity, including emerging cyber threats and challenges,
as well as technologies and strategies for enhancing cybersecurity in the
future. Overall, this chapter on cybersecurity aims to provide readers
with a comprehensive understanding of the importance of cybersecurity,
and equip them with the knowledge and tools necessary to protect
themselves and their organizations against cyber threats.
Fishing
15
message they want or need. Phishing scams can also use email, phone
calls, text messages, and social media tools to trick victims into providing
sensitive information [6]. Malicious URLs are the essential instrument of
a phishing attack. Text-based analyzes and Natural Language Processing
(NLP) processes are among the essential methods used in detecting these
attacks, and the detection performance is very high [2].
• Spear phishing
Spear phishing attacks are carried out toward the predetermined tar-
get. So Spear phishing is a targeted attack. In Spear Phishing at-
tacks, information is first collected about the person or organization
selected as the victim [16]. Information gathering is the first and most
crucial step in Spear Phishing attacks. The names used in the email
sent to the victim belong to real persons. Administrators, co-workers,
or people the victim knows are used as the sender of the email. At
the same time, an authorized person’s name and title who can deter-
mine/influence the content of the email are also selected. Thanks to
this method, the victim is given the impression of an email that may
come in the usual flow, and suspicious situations are eliminated.
• Whaling
Whaling is a type of phishing in which the attacker pretends to be a
senior official of a particular company. The attacker sends messages
similar to those written by the general manager, board member, or
CEO. They can ask them to transfer money to a specific account or
send sensitive information to an address, for example [6].
• engineering attacks
In a social engineering attack, it takes advantage of human behavior’s
weaknesses, using various persuasion and deception methods to obtain
information that malicious people want to access. Social engineering
attacks are one of the oldest and most dangerous types of attacks in
internet history. Human nature can and does make mistakes almost
at any time. At this point, cyber attackers take advantage of human
errors and gain access to systems/confidential information by coming
to the fore with social engineering attacks [9].
• Smishing/Vishing
Smishing is a form of phishing that uses mobile phones as an attack
platform. Smishing is carried out via text messages or SMS, and the
attack is called “SMiShing”. This attack has become increasingly
popular, as people are more likely to trust a message received via a
messaging app on their phone than a message sent via email. Various
16
detection methods have been developed for smishing with NLP tech-
niques, just like in spam email [18]. Vishing, on the other hand, is
a deception technique involving the use of Voice Over Internet Pro-
tocol (VoIP) to convince people that they are communicating with a
legitimate channel to easily share personal information [4].
• Man-in-the-middle
Man-in-the-middle (MITM) attack is an attack method that covers
the network by listening to the communication between two connec-
tions, capturing various data, or listening the communication but also
making all kinds of changes. In MITM, communication between two
parties can be interrupted, or misleading communication can be cre-
ated. This attack can be summarized as capturing and manipulating
packets on the network. The attacker can eavesdrop on traffic passing
between the target and network elements (server, switch, router, or
modem). In this attack, they can capture data packets freely circulat-
ing in the communication network, local network, or remote network.
The increasing prevalence of IoT devices has made this attack more
dangerous. Various approaches have been developed for the predic-
tion and detection of the attack [28].
Malware
Malware is software that harms or provides unauthorized access to
devices, websites, or networks for data breaches, identity theft, and
espionage without the user’s knowledge. Depending on the attacker’s
intent, the software can operate differently, performing various functions
such as hijacking, encrypting, deleting data, or monitoring computer
activity without permission. Static analysis or dynamic analysis
techniques can be used when deciding whether the software on a
computer is malicious or harmless [8] [22]. Static techniques do not run
code. It only examines code structure and binary data properties. On
the other hand, dynamic techniques run software to observe the behavior
of code running over the network or across end-to-end devices. Some
malware detection systems use only static or dynamic techniques, while
others implement both [5]. However, both techniques fall short when it
comes to Zero Day attacks. Today, these techniques are gradually being
replaced by machine learning methods [7] [11].
• Trojans
They are malicious code snippets inside software that appears to be
reliable. Because they can be hidden, they got a historical name.
After they are placed in the system, they can open the computer for
17
remote access [3].
• Worms
A worm or network can consume bandwidth and cause the computer
to crash. It can be defined as a subclass of viruses. They are self-
replicating, and unlike viruses, they do not need human action to
spread rapidly across computers and the entire network [27].
• Adware
Adware is software that tries to expose users to unwanted, potentially
malicious advertisements. It may redirect the user’s browser searches
to web pages containing unwanted product promotions [10].
• Ransomware
It usually works by encrypting data on the computer with a key un-
known to the user. Using this software, attackers demand a ransom
from the user so that the user can regain access to their files [1].
• Spyware
Spyware enables the collection of important information and trans-
actions of users without the user’s knowledge and sending this in-
formation to malicious people. It usually includes activity monitors,
keystroke capture (keylogger), and data collection. It can change se-
curity settings or interfere with network connections [27] [10] [1] [31].
• Botnet
Botnet attacks mean that many computers are managed from a sin-
gle point for malicious purposes. With access programs installed on
computers with some kind of virus, malicious hackers can acquire
thousands of robot computers that they can use in attacks. A Botnet
owner attacker can easily manage all the computers on his network
from anywhere in the world. Innocent users in the botnet network can
provide great support to attackers’ cybercrime without even knowing
about it. Intensive Distributed Denial of Service (DDoS) attacks can
be organized on the target system with bot networks [19]. As a result
of the strong DDoS attack on the target system, the system cannot
respond and become unresponsive to every packet sent.
Injection attacks
18
an application that allows unauthenticated user input [32]. The most
common injection attacks are Cross-site scripting and SQL injection.
• Cross-site scripting
Cross-site scripting/Cross-code execution (XSS) is an attack typically
found in web applications, using an attacker inserting code that will
harm a different user’s browser. XSS vulnerabilities normally allow
an attacker to take any action that the target user could take and
gain access to the user’s data. If the target user has access within the
application, the attacker can manage the control of the application as
a target and have full control over the data [15]. There are multiple
methods for XSS attacks. XSS can be done by a malicious script
run by the target user. The page viewed by the target can be a fake
page or a form page to be clicked with a link and requesting the
user’s credentials. Websites containing advertisements displayed by
the target or malicious e-mails sent to the user or community may be
subject to an XSS attack.
• SQL injection
SQL Injection is a type of attack technique performed by adding ad-
ditional SQL statements to the relevant field on the standard applica-
tion screen by using SQL features running at the base in data-driven
applications. SQL Injection exploits a vulnerability within applica-
tion software. SQL injection is a malicious code injection technique
that can destroy a database [29]. With SQL injection, attackers can
steal user information on the website, access hidden information, in-
terfere with existing data, change some operations, increase authority,
completely delete the database or switch to one of the other attacks
we mentioned earlier. The damage caused by this attack may be ir-
reparable since all the content of the website is contained in those
databases. The attacker only needs to access the database by exploit-
ing a vulnerability in the software [12].
Password attacks
Password attacks are among the most common, as encryption is the most
common mechanism we use to break into a system. Password attacks can
be carried out against corporate or personal targets. The purpose of the
attack is the social media networks, technologies, software, etc., used by
the person or institution. It harms institutions or individuals by
capturing the passwords of any field that requires a password [21].
• Brute-force
A Brute Force attack is a method where attackers use a trial and error
method to gain access to an account. This may include obtaining
19
password or personal identification number information, depending
on the situation. Most brute force attacks are automatic, so the
variety of targets, i.e. types of victims, is quite high. Brute force
attacks give attackers illegal access to websites that contain valuable
information. With this method, they can close the website completely
or gain access to user accounts. Patator is an application method with
a modular design and flexible structure used for brute force attacks
in the Kali Linux operating system. With this method, Secure Shell
(SSH) and File Transfer Protocol (FTP) attacks can be performed
[17].
• Dictionary attack
An unauthorized user attempts to log in using a known username
and a password list of common words. During this attack, input
information from a predefined list or dictionary of possible passwords
is tried with all letter and word combinations [23].
DoS attacks
A denial of service attack (DoS) is an attack that aims to render a
machine or network inaccessible to users who need to be served by taking
it out of service. DoS attacks achieve this by filling the target with traffic
or sending information that triggers a crash. Either way, the DoS attack
deprives legitimate users of the service or resource they expect [14].
Victims of DoS attacks often target web servers of high-profile
organizations such as banking, commercial and media companies or
government and commercial organizations. While DoS attacks do not
typically result in the theft or loss of important information or other
assets, it can cost the victim a great deal of time and money to deal
with. Distributed Denial of Service (DDos) attacks occur when multiple
attack systems organize a synchronized DoS attack on a single target.
The main difference is that instead of being attacked from one location,
the target can be attacked from many locations at once [26].
20
3. Ransomware attacks increased by 485 percent in 2020, with the aver-
age ransom demand rising to 178,000 dollars (IBM).
4. In 2020, phishing attacks accounted for 36 percent of all data breaches
(Verizon).
5. The healthcare industry experienced the highest cost of data breaches,
with an average cost of 7.13 million dollars per breach (IBM).
6. Small businesses are increasingly targeted by cybercriminals, with 43
percent of all cyberattacks targeting small businesses in 2020 (Veri-
zon).
7. In 2020, remote workers were targeted by cybercriminals with a 450
percent increase in phishing attacks (IBM).
8. Cybersecurity job postings have increased by 94 percent since 2013,
with an estimated 3.5 million unfilled cybersecurity positions world-
wide (Cybersecurity Ventures).
.
These statistics highlight the growing threat of cybercrime and the need
for organizations to take proactive measures to protect their data and
systems. Implementing strong security measures, providing regular
cybersecurity training to employees, and keeping software up to date can
help to mitigate the risks of cyber threats
21
• vailability: This principle involves ensuring that computer systems
and networks are available to authorized users when needed. This can
be achieved through measures such as redundancy, fault tolerance,
and disaster recovery planning.
• Authentication: this principle involves verifying the identity of
users and devices to prevent unauthorized access. This can be achieved
through measures such as passwords, biometrics, and two-factor au-
thentication.
• Authorization: This principle involves ensuring that users and de-
vices have the appropriate level of access to resources based on their
roles and responsibilities. This can be achieved through measures
such as access controls, privilege management, and network segmen-
tation.
• Accountability: This principle involves holding individuals and or-
ganizations responsible for their actions and ensuring that they can
be traced back to the source. This can be achieved through measures
such as audit trails, logging, and incident response planning.
22
various layers of security controls.Overall, the defense in depth strategy
23
they can help to prevent unauthorized access to a network and pro-
tect against malware and other cyber threats.(What Is a Firewall?
(2022). Retrieved from
https://www.cisco.com/c/en/us/products/security/ firewalls/what-is-
a-firewall.html)
• Intrusion detection and prevention systems (IDS/IPS) are designed
to monitor network traffic and identify potential security threats. IDS
systems detect and alert administrators to suspicious activity, while
IPS systems can take immediate action to block potential threats.
• IDS/IPS systems use a combination of signature-based and behavior-
based detection methods to identify potential threats. Signature-
based detection involves comparing network traffic to a database of
known threat signatures, while behavior-based detection looks for
abnormal patterns of activity that may indicate a new or unknown
threat.
• Effective firewall and IDS/IPS systems can significantly improve an
organization’s cybersecurity posture by helping to prevent unautho-
rized access and detect and prevent potential cyber attacks.
(Intrusion Detection and Prevention Systems (IDPS). (2022). Re-
trieved from
https://www.cisco.com/c/en/us/products/security/intrusion-detection-
prevention-systems/index.html)
24
organization’s cybersecurity posture by helping to detect and remove
malware before it can cause damage to computer systems and networks.
It is important to note that antivirus and anti-malware software should
be kept up to date, as new threats are constantly emerging. Regular
updates to antivirus and anti-malware software ensure that it has the
latest threat signatures and can detect and remove new and emerging
threats.
25
1.4.3 Encryption
Encryption is a crucial cybersecurity measure that involves converting
plain text data into a coded or scrambled form, making it unreadable to
anyone who does not have the key to decrypt it. Encryption helps to
protect sensitive data from unauthorized access and theft, particularly
when it is transmitted over insecure networks or stored on vulnerable
devices. Encryption works by using mathematical algorithms to convert
plain text data into a cipher text that can only be read with the correct
key. The strength of the encryption depends on the length and
complexity of the key used to encrypt the data. Two fundamental
encryption methods exist: symmetric encryption and asymmetric
encryption.. Symmetric encryption involves the utilization of a single key
for both encrypting and decrypting data.. This type of encryption is
faster than asymmetric encryption but requires a secure way to share the
key between the sender and receiver. Asymmetric encryption, also known
as public key encryption, uses two keys: a public key and a private key.
The public key is used to encrypt the data, and the private key is used to
decrypt it. Asymmetric encryption is slower than symmetric encryption
but is more secure because the private key is kept secret by the owner.
Encryption is used in many areas of cybersecurity, including data
protection, secure communication, and secure storage. It is also a critical
component of many cybersecurity regulations and standards, including
the General Data Protection Regulation (GDPR) and the Payment Card
Industry Data Security Standard (PCI DSS).
26
• Multi-factor authentication: Using multiple factors to verify a user’s
identity, such as a password and a security token, can greatly
increase the security of the authentication process.
• Account lockout policies: After a certain number of unsuccessful
login attempts, user accounts should be locked out to prevent
brute-force attacks.
• Regular security awareness training: Users should be educated on
the importance of strong passwords and other security best practices
to reduce the risk of social engineering attacks.
• Access control is the process of managing user permissions and
privileges to ensure that only authorized individuals have access to
sensitive data and systems. Access control policies should be based
on the principle of least privilege, which means that users should
only have the minimum level of access required to perform their job
functions.
Best practices for access control include:
• Role-based access control: Users should be assigned roles based on
their job functions, with permissions and privileges assigned
accordingly.
• Regular access reviews: Access should be reviewed regularly to
ensure that users still require their current level of access.
• Separation of duties: Critical tasks should be divided among
multiple users to reduce the risk of insider threats.
Effective user authentication and access control are essential components
of cybersecurity that help to protect sensitive data and systems from
unauthorized access and misuse.
27
• Testing backups: Backups should be tested regularly to ensure that
they are functional and can be used to restore data if necessary.
• Disaster recovery plan: A disaster recovery plan should be in place
to ensure that critical systems can be restored quickly in the event
of a major outage or disaster.
• Redundancy: Critical systems and data should have redundant
backups and failover mechanisms in place to minimize downtime and
ensure continuity of operations.
Implementing backup and disaster recovery best practices can help
organizations to minimize the impact of cybersecurity incidents and
other disasters, and ensure that critical data and systems are protected
28
Employees who are trained in incident response protocols are better
equipped to respond quickly and effectively to incidents, minimizing
damage and reducing downtime.
• Compliance Requirements: Many industries are subject to
compliance requirements, such as HIPAA for healthcare or PCI-DSS
for payment card processing. Education and training can help
organizations to understand and meet these requirements, reducing
the risk of regulatory penalties and other legal consequences.
Overall, education and training are critical components of a successful
cybersecurity strategy. By investing in cybersecurity education and
training, organizations can reduce the risk of cyber attacks, protect
sensitive data, and maintain the trust of their customers and
stakeholders.
29
• Certification programs: Many cybersecurity certification programs
are available, including CompTIA Security+, Certified Information
Systems Security Professional (CISSP), and Certified Ethical Hacker
(CEH). These programs can provide employees with the knowledge
and skills needed to secure networks and systems.
1.6 Conclusion
In conclusion, cybersecurity is a critical issue that affects individuals,
businesses, and governments alike. With the increasing sophistication
and frequency of cyber attacks, it is essential to implement effective
cybersecurity measures and promote cybersecurity awareness and
education. This chapter has discussed the importance of cybersecurity,
the various threats to cybersecurity, the principles of cybersecurity, and
cybersecurity measures and best practices.It has also highlighted the
importance of cybersecurity education and training and provided
examples of cybersecurity training programs and resources. By following
best practices and promoting cybersecurity awareness and education,
organizations can reduce the risk of cyber attacks and protect their
sensitive data and systems.It is important to remain vigilant and
proactive in addressing cybersecurity threats to ensure the safety and
security of our digital world.
30
Chapter 2
Chapter02
31
Bibliography
32
[10] Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera
Jalil, Xuan Liu, and Waleed S Alnumay. Deepamd: Detection and
identification of android malware using high-efficient deep artificial
neural network. Future Generation computer systems, 115:844–856,
2021.
[11] Evanson Mwangi Karanja, Shedden Masupe, and Mandu Gasennelwe
Jeffrey. Analysis of internet of things malware using image texture fea-
tures and machine learning techniques. Internet of Things, 9:100153,
2020.
[12] Ömer Kasim. An ensemble classification-based approach to detect
attack level of sql injections. Journal of Information Security and
Applications, 59:102852, 2021.
[13] Seungmin Kim, Gyunyoung Heo, Enrico Zio, Jinsoo Shin, and Jae-
gu Song. Cyber attack taxonomy for digital environment in nuclear
power plants. Nuclear Engineering and Technology, 52(5):995–1001,
2020.
[14] Jerry John Kponyo, Justice Owusu Agyemang, Griffith Selorm Klogo,
and Joshua Ofori Boateng. Lightweight and host-based denial of ser-
vice (dos) detection and defense mechanism for resource-constrained
iot devices. Internet of Things, 12:100319, 2020.
[15] Koundinya Kuppa, Anushka Dayal, Shashank Gupta, Amit Dua,
Pooja Chaudhary, and Shailendra Rathore. Convxss: A deep learning-
based smart ict framework against code injection attacks for html5
web applications in sustainable smart city infrastructure. Sustainable
Cities and Society, 80:103765, 2022.
[16] Youngsun Kwak, Seyoung Lee, Amanda Damiano, and Arun Vish-
wanath. Why do users not report spear phishing emails? Telematics
and Informatics, 48:101343, 2020.
[17] Maisha Maliha. A supervised learning approach: Detection of cyber
attacks. In 2021 IEEE International Conference on Telecommunica-
tions and Photonics (ICTP), pages 1–5. IEEE, 2021.
[18] Sandhya Mishra and Devpriya Soni. Smishing detector: A security
model to detect smishing through sms content analysis and url be-
havior analysis. Future Generation Computer Systems, 108:803–815,
2020.
[19] Giang L Nguyen, Braulio Dumba, Quoc-Dung Ngo, Hai-Viet Le, and
Tu N Nguyen. A collaborative approach to early detection of iot
botnet. Computers & Electrical Engineering, 97:107525, 2022.
33
[20] Jordan J Plotnek and Jill Slay. Cyber terrorism: A homogenized
taxonomy and definition. Computers & Security, 102:102145, 2021.
[21] Arun Babu Puthuparambil and Jithin Jose Thomas. Freestyle, a ran-
domized version of chacha for resisting offline brute-force and dic-
tionary attacks. Journal of Information Security and Applications,
49:102396, 2019.
[22] Valerian Rey, Pedro Miguel Sánchez Sánchez, Alberto Huertas
Celdrán, and Gérôme Bovet. Federated learning for malware detec-
tion in iot devices. Computer Networks, 204:108693, 2022.
[23] Ragil Saputra, Beta Noranita, et al. Analysis of gpgpu-based brute-
force and dictionary attack on sha-1 password hash. In 2019 3rd
International Conference on Informatics and Computational Sciences
(ICICoS), pages 1–4. IEEE, 2019.
[24] Rashi Saxena and E Gayathri. Cyber threat intelligence challenges:
Leveraging blockchain intelligence with possible solution. Materials
Today: Proceedings, 51:682–689, 2022.
[25] Shishir Kumar Shandilya, Saket Upadhyay, Ajit Kumar, and Atulya K
Nagar. Ai-assisted computer network operations testbed for nature-
inspired cyber security based adaptive defense simulation and analy-
sis. Future Generation Computer Systems, 127:297–308, 2022.
[26] Jagdeep Singh and Sunny Behal. Detection and mitigation of ddos
attacks in sdn: A comprehensive review, research challenges and fu-
ture directions. Computer Science Review, 37:100279, 2020.
[27] Jagsir Singh and Jaswinder Singh. A survey on machine learning-
based malware detection in executable files. Journal of Systems Ar-
chitecture, 112:101861, 2021.
[28] N Sivasankari and S Kamalakkannan. Detection and prevention of
man-in-the-middle attack in iot network using regression modeling.
Advances in Engineering Software, 169:103126, 2022.
[29] Peng Tang, Weidong Qiu, Zheng Huang, Huijuan Lian, and Guozhen
Liu. Detection of sql injection based on artificial neural network.
Knowledge-Based Systems, 190:105528, 2020.
[30] Mingtao Wu and Young B Moon. Taxonomy of cross-domain attacks
on cybermanufacturing system. Procedia Computer Science, 114:367–
374, 2017.
34
[31] Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, Sowmya Vish-
vanathan, and Tuan D Pham. A two-stage deep learning framework
for image-based android malware detection and variant classification.
Computational Intelligence, 38(5):1748–1771, 2022.
[32] Ruibo Yan, Xi Xiao, Guangwu Hu, Sancheng Peng, and Yong Jiang.
New deep learning method to detect code injection attacks on hybrid
applications. Journal of Systems and Software, 137:67–77, 2018.
35