Ciberseguridad: Tipos de ataques y vulnerabilidades en IoT para el hogar

datacite.rightshttp://purl.org/coar/access_right/c_16ec
dc.contributor.advisorSanmartín Mendoza, Paul Adolfo
dc.contributor.authorArteta Peñaloza, Alejandro Mario
dc.contributor.authorJiménez Molina, Miguel Andrés
dc.contributor.authorVarela López, Andrés David
dc.contributor.authorTelles Bertel, Diego Andrés
dc.date2027-30-12
dc.date.accessioned2024-05-07T14:26:40Z
dc.date.available2024-05-07T14:26:40Z
dc.date.issued2023
dc.description.abstractEn la creciente era de la Internet de las Cosas (IoT), donde la interconexión de dispositivos redefine nuestros hogares como "inteligentes", este artículo aborda exhaustivamente las vulnerabilidades y riesgos de seguridad asociados con la proliferación de dispositivos IoT en el entorno doméstico. El análisis se inicia con una exploración detallada de las tecnologías de conectividad, como Zigbee, Wi-Fi, Bluetooth y RFID, destacando sus debilidades particulares, desde problemas de autenticación hasta riesgos de suplantación de identidad. Se examinan métodos cruciales para mitigar estos riesgos y fortalecer las defensas cibernéticas. Se presenta un enfoque específico en casos notorios, como el ataque de la botnet Mirai en 2016, subrayando las consecuencias catastróficas de dispositivos mal configurados y contraseñas débiles. Este análisis sirve como fundamento para entender los peligros inherentes a la falta de actualizaciones de seguridad y la vulnerabilidad de dispositivos físicos en lugares accesibles. El artículo continúa explorando dispositivos comunes en hogares inteligentes, como asistentes virtuales, tomacorrientes y bombillas inteligentes, destacando sus beneficios y, al mismo tiempo, exponiendo vulnerabilidades potenciales, desde la falta de autenticación sólida hasta la ausencia de cifrado de datos adecuado. La sección final se centra en los ataques dirigidos a hogares inteligentes, que van desde robos de datos hasta ataques de denegación de servicio. Se proporcionan estadísticas alarmantes sobre la vulnerabilidad generalizada de los hogares digitales, con un énfasis particular en las debilidades de routers y la necesidad urgente de contramedidas. El resumen culmina resaltando las medidas cruciales que deben tomar los usuarios, fabricantes y proveedores para proteger los hogares inteligentes. Desde cambios en las configuraciones predeterminadas hasta actualizaciones periódicas y la segmentación de redes, se presenta un conjunto de estrategias para salvaguardar la seguridad cibernética en la era IoT. Este artículo busca no solo informar sobre los desafíos, sino también proporcionar un marco integral para abordarlos y garantizar la seguridad en la revolución de los hogares inteligentes.spa
dc.description.abstractThis article delves into the vulnerabilities and security risks associated with the widespread adoption of Internet of Things (IoT) devices in home environments. Beginning with a detailed exploration of connectivity technologies such as Zigbee, Wi-Fi, Bluetooth, and RFID, the analysis highlights their specific weaknesses, ranging from authentication issues to identity theft risks. Crucial methods for mitigating these risks and strengthening cybersecurity defenses are examined. The article then focuses on notorious cases, such as the Mirai botnet attack in 2016, emphasizing the catastrophic consequences of poorly configured devices and weak passwords. This analysis serves as a foundation for understanding the dangers of lacking security updates and the vulnerability of physically accessible devices. Common devices in smart homes, including virtual assistants, smart outlets, and bulbs, are explored, outlining their benefits while exposing potential vulnerabilities, such as weak authentication and inadequate data encryption. The final section concentrates on attacks targeting smart homes, spanning data theft to denial-of-service attacks. Alarming statistics on the widespread vulnerability of digital homes are provided, with a particular emphasis on router weaknesses and the urgent need for countermeasures. The summary concludes by highlighting crucial measures for users, manufacturers, and providers to protect smart homes. From changing default settings to regular updates and network segmentation, a comprehensive set of strategies is presented to safeguard cybersecurity in the IoT era. This article aims not only to inform about the challenges but also to provide a comprehensive framework for addressing them and ensuring security in the smart home revolution.eng
dc.format.mimetypepdf
dc.identifier.urihttps://hdl.handle.net/20.500.12442/14587
dc.language.isospa
dc.publisherEdiciones Universidad Simón Bolívar
dc.publisherFacultad de Ingenieríasspa
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccess
dc.subjectVulnerabilidadesspa
dc.subjectInternet de las cosasspa
dc.subjectCiberseguridadspa
dc.subjectCasas inteligentesspa
dc.subjectVulnerabilitieseng
dc.subjectIoTeng
dc.subjectCybersecurityeng
dc.subjectSmart homeeng
dc.titleCiberseguridad: Tipos de ataques y vulnerabilidades en IoT para el hogarspa
dc.title.translatedCybersecurity: Types of attacks and vulnerabilities on IoT for homeeng
dc.type.driverinfo:eu-repo/semantics/bachelorThesis
dc.type.spaTrabajo de grado - pregradospa
dcterms.referencesN. Latto, “Riesgos de seguridad en el Internet de las cosas (IoT),” Riesgos de seguridad en el Internet de las cosas (IoT), Nov. 13, 2019. Accessed: Aug. 04, 2023. Available: https://www.avast.com/es-es/c-what-is-the-internet-of-things#topic-1spa
dcterms.referencesB. K. Sovacool and D. D. Furszyfer Del Rio, “Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies,” Renewable and Sustainable Energy Reviews, vol. 120, no. 109663, Dec. 2019, doi: https://doi.org/10.1016/j.rser.2019.109663.eng
dcterms.referencesK. Lounis and M. Zulkernine, "Attacks and Defenses in Short-Range Wireless Technologies for IoT," in IEEE Access, vol. 8, pp. 88892-88932, 2020, doi: 10.1109/ACCESS.2020.2993553.eng
dcterms.referencesA. Tomar, “Introduction to Zibgbee Technology,” Element14, Jul. 2011. https://eclass.uoa.gr/modules/document/file.php/DI367/%CE%A5%CE%BB%CE%B9%CE%BA%CF%8C/introduction-to-zigbee-technology.pdfeng
dcterms.referencesCisco, “What Is Wi-Fi?,” Cisco. Accessed: Aug. 11, 2023. https://www.cisco.com/c/en/us/products/wireless/what-is-wifi.htmleng
dcterms.referencesR. Shorey and B. A. Miller, "The Bluetooth technology: merits and limitations," 2000 IEEE International Conference on Personal Wireless Communications. Conference Proceedings (Cat. No.00TH8488), Hyderabad, India, 2000, pp. 80-84, doi: 10.1109/ICPWC.2000.905777.eng
dcterms.referencesR. Want, "An introduction to RFID technology," in IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, Jan.-March 2006, doi: 10.1109/MPRV.2006.2.eng
dcterms.referencesJ. I. Iturbe Araya and H. Rifà-Pous, “Anomaly-based cyberattacks detection for smart homes: A systematic literature review,” Internet of Things, vol. 22, no. 100792, Apr. 2023, doi: https://doi.org/10.1016/j.iot.2023.100792.eng
dcterms.referencesB. Tushir, Y. Dalal, B. Dezfouli and Y. Liu, "A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices," in IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6282-6292, 15 April15, 2021, doi: 10.1109/JIOT.2020.3026023.eng
dcterms.referencesKaspersky, “What is a Botnet?,” Kaspersky.com, 2019. https://usa.kaspersky.com/resource-center/threats/botnet-attacks (accessed Oct. 06, 2023).eng
dcterms.referencesKaspersky, “Defending Yourself from a Man in the Middle Attack,” www.kaspersky.com, Oct. 30, 2017. https://www.kaspersky.com/resource-center/threats/man-in-the-middle-attackeng
dcterms.referencesCrowdStrike, “What is a Brute Force Attack? Definition & Examples | CrowdStrike,” crowdstrike.com, Jun. 01, 2022. https://www.crowdstrike.com/cybersecurity-101/brute-force-attacks/eng
dcterms.referencesKaspersky, “What is Spoofing?,” www.kaspersky.com, Jan. 13, 2021. https://www.kaspersky.com/resource-center/definitions/spoofingeng
dcterms.referencesU. Saxena, J. Sodhi and Y. Singh, "An Analysis of DDoS Attacks in a Smart Home Networks," 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 2020, pp. 272-276, doi: 10.1109/Confluence47617.2020.9058087.eng
dcterms.referencesKaspersky, “What is Zero Day Exploit?,” www.kaspersky.com, Feb. 27, 2018. https://www.kaspersky.com/resource-center/definitions/zero-day-exploiteng
dcterms.referencesR. C, “What is a deauthentication attack? - Atlas VPN,” atlasvpn.com, Nov. 30, 2022. https://atlasvpn.com/blog/what-is-a-deauthentication-attackeng
dcterms.referencesG. Kibirige and C. Sanga, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network,” 2015. Available: https://arxiv.org/ftp/arxiv/papers/1505/1505.01941.pdfeng
dcterms.referencesCrowdStrike, “Keyloggers: How They Work and How to Detect Them | CrowdStrike,” crowdstrike.com, Feb. 02, 2023. https://www.crowdstrike.com/cybersecurity-101/attack-types/keylogger/ (accessed Oct. 06, 2023).eng
dcterms.referencesM. Humayun, N. Jhanjhi, A. Alsayat, and V. Ponnusamy, “Internet of things and ransomware: Evolution, mitigation and prevention,” Egyptian Informatics Journal, vol. 22, no. 1, pp. 105–117, May 2020, doi: https://doi.org/10.1016/j.eij.2020.05.003.eng
dcterms.referencesB. Krebs, “Some Basic Rules for Securing Your IoT Stuff,” Krebs on Security, Jan. 17, 2018. Accessed: Aug. 04, 2023. Available: https://krebsonsecurity.com/2018/01/some-basic-rules-for-securing-your-iot-stuff/eng
dcterms.references“Cybersecurity White Paper: EO Response,” 2022, Pp 11-14, doi: https://doi.org/10.6028/nist.cswp.02042022-2.eng
dcterms.referencesC. Bravo, “Botnet Mirai: ¿nuestros electrodomésticos pueden atacarnos?,” www.welivesecurity.com, Aug. 04, 2023. https://www.welivesecurity.com/es/seguridad-iot/botnet-mirai-electrodomesticos-pueden-atacarnos/ (accessed Sep. 29, 2023).spa
dcterms.referencesV. Ruiz, “Los ataques de la botnet Mirai, fuerte lección para colocar a la seguridad como un tema prioritario,” LinkedIn, Jul. 13, 2023. https://www.linkedin.com/pulse/los-ataques-de-la-botnet-mirai-fuerte-lecci%C3%B3n-para-colocar-ruiz/ (accessed Sep. 29, 2023).spa
dcterms.referencesInteractivadigital, “Riesgos de los asistentes virtuales y cómo evitarlos, Opinión | Interactiva,” InteractivaDigital.com, Dec. 24, 2019. https://interactivadigital.com/opinion-marketing-digital/riesgos-de-los-asistentes-de-voz-y-como-evitarlos/ (accessed Aug. 27, 2023).spa
dcterms.referencesT. DIS, “Dolphin attacks, and what they mean for digital assistants,” Thales blog, Jun. 12, 2018. https://dis-blog.thalesgroup.com/iot/2018/06/12/dolphin-attacks-and-what-they-mean-for-digital-assistants/ (accessed Aug. 27, 2023).eng
dcterms.referencesN. Carlini and D. Wagner, “Audio Adversarial Examples: Targeted Attacks on Speech-to-Text,” 2018. Available: https://nicholas.carlini.com/papers/2018_dls_audioadvex.pdfeng
dcterms.referencesE. Press, “Los enchufes inteligentes ponen en peligro la información guardada en la red doméstica,” www.europapress.es, Jan. 12, 2019. https://www.europapress.es/portaltic/ciberseguridad/noticia-enchufes-inteligentes-ponen-peligro-informacion-guardada-red-domestica-20190112112934.html (accessed Aug. 27, 2023).spa
dcterms.referencesR. Mitchell, “Smart homes can experience up to 12,000 attacks in a week,” www.electropages.com, Jul. 22, 2022. https://www.electropages.com/blog/2022/07/smart-homes-can-experience-12000-attacks-weekeng
dcterms.referencesA. Husar, “IoT Security: 5 cyber-attacks caused by IoT security vulnerabilities,” www.cm-alliance.com, Oct. 25, 2022. https://www.cm-alliance.com/cybersecurity-blog/iot-security-5-cyber-attacks-caused-by-iot-security-vulnerabilitieseng
dcterms.referencesKaspersky, “How safe are smart homes?,” usa.kaspersky.com, Sep. 10, 2020. https://usa.kaspersky.com/resource-center/threats/how-safe-is-your-smart-homeeng
dcterms.referencesAvast, “Avast Smart Home Security Report 2019,” Feb. 2019. Available: https://cdn2.hubspot.net/hubfs/486579/avast_smart_home_report_feb_2019.pdfeng
dcterms.referencesKaspersky, “Smart home technologies in real life,” www.kaspersky.com, Feb. 25, 2023. https://www.kaspersky.com/blog/iot-survey-report-2023/eng
dcterms.referencesCyber Security Hub Editor, “A deep look into the ICS threat landscape,” Cyber Security Hub, Jan. 30, 2023. https://www.cshub.com/iot/whitepapers/otiot-security-report-a-deep-look-into-the-ics-threat-landscapeeng
dcterms.referencesLocking Out Risks, & Homes, T. to S. (s/f). IoT Device Security. Trendmicro.com. Recuperado el 9 de octubre de 2023, de https://documents.trendmicro.com/assets/white_papers/IoT-Device-Security.pdf?_ga=2.157898169.2057653699.1696869221-199051684.1696869221eng
dcterms.referencesPranata, I., et al., December 2012. Securing and governing access in ad-hoc networks of internet of things. In: Proceedings of the IASTED International Conference on Engineering and Applied Science, Colombo, Sri Lanka, pp. 84–90. https://www.researchgate.net/publication/266629783_Securing_and_Governing_Access_in_Ad-Hoc_Networks_of_Internet_of_Thingseng
dcterms.referencesG. Gallopeni, B. Rodrigues, M. Franco, and B. Stiller, “A Practical Analysis on Mirai Botnet Traffic,” IEEE Xplore, Jun. 01, 2020. https://ieeexplore.ieee.org/abstract/document/9142798eng
dcterms.referencesJ. Galeano-Brajones, J. Carmona-Murillo, J. F. Valenzuela-Valdés, and F. Luna-Valero, “Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN : An Experimental Approach,” Sensors, vol. 20, no. 3, p. 816, Feb. 2020, doi: https://doi.org/10.3390/s20030816.eng
dcterms.referencesN. Woolf, “DDoS attack that disrupted internet was largest of its kind in history, experts say,” The Guardian, Oct. 26, 2016. https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botneteng
dcterms.referencesM. Fagan, K. N. Megas, K. Scarfone, and M. Smith, “Foundational cybersecurity activities for IoT device manufacturers,” May 2020, doi: https://doi.org/10.6028/nist.ir.8259.eng
dcterms.referencesK. Boeckl et al., “Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks,” Jun. 2019, doi: https://doi.org/10.6028/nist.ir.8228.eng
oaire.versioninfo:eu-repo/semantics/acceptedVersion
sb.programaIngeniería de Sistemasspa
sb.sedeSede Barranquillaspa

Archivos

Bloque original
Mostrando 1 - 2 de 2
Cargando...
Miniatura
Nombre:
PDF_Resumen.pdf
Tamaño:
230.59 KB
Formato:
Adobe Portable Document Format
No hay miniatura disponible
Nombre:
PDF.pdf
Tamaño:
399.16 KB
Formato:
Adobe Portable Document Format
Bloque de licencias
Mostrando 1 - 1 de 1
No hay miniatura disponible
Nombre:
license.txt
Tamaño:
2.93 KB
Formato:
Item-specific license agreed upon to submission
Descripción: