Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
93 страница из 122
In the IoT network, every smart device is connected with the web, they indirectly getting the weaknesses of such structure like DDoS, replay assaults, eavesdropping, and web-application threats [31]. Consequently, assaults are classified into three sorts on the basis of the IoT infrastructure and registered here.
2.5.1 Devices of IoT
Devices of IoT are used to obtain data from its domain with the aid of internet connection. Some of the assaults scheduled and discussed below.
i. Brute force attack: The main objective of the attacker is to get authentication credentials of the smart device by employing guessing mechanism. When some of the devices have login credentials that are default and the assailant is aware about it, then he can easily get those devices’ sensitive information using default password set obtainable on the web. In IoT devices, botnet attack reasons for such susceptibility [32].
ii. Buffer overflow attack: It happens owing to uninformed faults during coding leading to this attack [33].