Friday, March 5, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Artificial Intelligence

AI Can Help Protect Smart Home IoT Devices from Hackers

July 31, 2020
in Artificial Intelligence
AI Can Help Protect Smart Home IoT Devices from Hackers
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Smart home hubs and IoT devices, poised for dramatic growth, have an immature security infrastructure. AI can help manage the complexity. (Stephan Bechert on Unsplash)

By AI Trends Staff

You might also like

Asimov’s Three Laws Of Robotics And AI Autonomous Cars 

Tesla Working on Full Self-Driving Mode, Extending AI Lead 

RAND Corp. Finds DoD “Significantly Challenged” in AI Posture 

As researchers continue to find security flaws in smart home hub IoT devices, part of an immature security infrastructure. One researcher suggests AI can be helpful to address the vulnerabilities.

A cybersecurity team from ESET, an internet security company based in Slovakia, found bugs in three different hubs dangerous enough to trigger remote code execution, data leaks and Man-in-the-Middle attacks, according to a recent account from ZDNet.  The hubs were: the Fibaro Home Center Lite, eQ-3’s Homematic Central Control Unit (CCU2) and ElkoEP’s eLAN-RF-003.

The issues were reported to the vendors, and ESET did some follow up evaluation later. “Some of the issues appear to have been left unresolved, at least on older generations of devices,” ESET stated in its report. “Even if newer, more secure generations are available, though, the older ones are still in operation […] With little incentive for users of older-but-functional devices to upgrade them, they [users] need to be cautious, as they could still be exposed.”

The smart home hub vulnerabilities exist in devices that are poised for dramatic growth. According to IDC, the global market for smart home devices is expecting 26.9% growth in 2019, amounting to 832.7 million shipments. Growth of 17% is expected through 2023.

Revenue generated by the smart home market was estimated to be some $74 billion in 2019, with the US leading at $25 billion in sales projected for 2020, according to Statista. US penetration of smart homes is projected to grow from 18.5% in 2020 to 52% by 2023, the researchers estimate.

This growth means homes will be equipped with enough connected devices to rival the number of connections in a mid-sized company. Updates, passwords and settings will have to be managed, without the support of an IT security team or enterprise-level security tools, suggested a recent account from the IoT Security Foundation.

“This is where artificial intelligence and machine learning can come to the rescue,” the report states. “As is the case in many industries and niches, machine learning is complementing human effort and making up for the lack of human resources.”

AI Looks for Patterns in Device Communication to Flag Unusual Activity

AI is specifically adept at finding and establishing patterns, when it’s fed huge amounts of data, which is plentiful from IoT devices.

For example, a network traffic monitoring system can be applied to interactions between devices, to find attacks that might be past the outer perimeters. While the IoT is heavy with machine-to-machine (M2M) traffic, since device functionality and interaction is limited per device, the devices engaging in abnormal exchanges can be singled out. They may be compromised.

The common denominator of AI-based endpoint solutions that can outsmart malware is that they are very lightweight and use pattern-based approaches to deal with threats.

Researchers with consultancy Black Marble last year reported finding three vulnerabilities in two smart hubs made by Zagreb from Zipato of Croatia, according to an account in Bank Info Security. The researchers tried to see if they could unlock a door remotely without prior access, and take data off a single controller that could be leveraged to open other doors. They also searched for vulnerabilities that might allow for unlocking a door on the same network as the controller.

The researchers accomplished two of the three tasks and reported the third was very likely possible given enough time. The researchers reported the results to the vendor, which was reported to have addressed the software issues in a timely manner.

Zipato says it has 112,000 devices in 20,000 households across 89 countries; the company is not sure how many serve as smart home hubs.

Hackers Look for Data of Value Wherever They Can Find It

Hackers target smart home hubs for the potential to retrieve passwords and other data they can use for further exploits.

“All of these smart devices are really networked computers in addition to what they traditionally are: refrigerators, light bulbs, televisions, cat litter boxes, dog feeders, cameras, garage door openers, door locks,” stated Professor Ralph Russo, Director of Information Technology Programs at Tulane University, in an account from Safety. ”Many of these continually collect data from embedded sensors. Malicious actors could gain access to your home network through your device if they can exploit an IoT device vulnerability.”

Professor Ralph Russo, Director of Information Technology Programs, Tulane University

Devices seen most at risk are outdoor devices with embedded computers that support little or no security protocols, such as garage door openers, wireless doorbells and smart sprinklers. Next most vulnerable are devices inside the home that can be controlled through an app from a smartphone or PC, such as smart bulbs and switches, security monitors, smart door locks and smart thermostats.

“These devices rely on weak security tokens and may be hacked due to weaknesses in the communication protocols used, configuration settings or vulnerable entry-points left open by the vendor for maintenance,” stated Dr. Zahid Anwar, an associate professor at Fontbonne University, St Louis.

Dr. Zahid Anwar, Associate Professor, Fontbonne University, St Louis

Some hackers intend to take over smart home devices as part of a plan to build a network of bots, which could be used for example to orchestrate a large-scale capture of personal data, suggested Maciej Markiewicz, Security CoP Coordinator & Sr. Android Developer at Netguru, a digital consultancy and software company. “These devices can be easily used to conduct more complex attacks. Very often, the management of such botnet networks consisting of smart home devices are sold on the darknet to be used in crimes,” he stated.

Suggestions to protect smart home hubs include: assessing whether the risk of connection is worth the benefit, secure the Wi-Fi network router, use a password manager, register devices with the manufacturers in order to get the software updates, consider a professional installation and unplug the devices not in use.

Read the source articles in  ZDNet, at the IoT Security Foundation, in Bank Info Security and in Safety.

Credit: AI Trends By: Benjamin Ross

Previous Post

Global Machine Learning as a Service (MlaaS) Market boosting the growth Worldwide: Market dynamics and trends, efficiencies Forecast 2024

Next Post

New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

Related Posts

Asimov’s Three Laws Of Robotics And AI Autonomous Cars 
Artificial Intelligence

Asimov’s Three Laws Of Robotics And AI Autonomous Cars 

February 26, 2021
Tesla Working on Full Self-Driving Mode, Extending AI Lead 
Artificial Intelligence

Tesla Working on Full Self-Driving Mode, Extending AI Lead 

February 25, 2021
RAND Corp. Finds DoD “Significantly Challenged” in AI Posture 
Artificial Intelligence

RAND Corp. Finds DoD “Significantly Challenged” in AI Posture 

February 25, 2021
SolarWinds Hackers Targeted Cloud Services as a Key Objective 
Artificial Intelligence

SolarWinds Hackers Targeted Cloud Services as a Key Objective 

February 25, 2021
IBM Reportedly Retreating from Healthcare with Watson 
Artificial Intelligence

IBM Reportedly Retreating from Healthcare with Watson 

February 25, 2021
Next Post
New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Singapore Airlines frequent flyer members hit in third-party data security breach
Internet Security

Singapore Airlines frequent flyer members hit in third-party data security breach

March 5, 2021
CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws
Internet Privacy

CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws

March 5, 2021
Generation Z: How post-millennial young people are engaging with blockchain
Blockchain

Generation Z: How post-millennial young people are engaging with blockchain

March 5, 2021
Machine intelligence – Spy agencies have high hopes for AI | Science & technology
Machine Learning

Machine intelligence – Spy agencies have high hopes for AI | Science & technology

March 5, 2021
8 concepts you must know in the field of Artificial Intelligence | by Diana Diaz Castro | Feb, 2021
Neural Networks

8 concepts you must know in the field of Artificial Intelligence | by Diana Diaz Castro | Feb, 2021

March 5, 2021
A Quick Guide to Understanding YouTube Ads [Infographic]
Marketing Technology

A Quick Guide to Understanding YouTube Ads [Infographic]

March 5, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Singapore Airlines frequent flyer members hit in third-party data security breach March 5, 2021
  • CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws March 5, 2021
  • Generation Z: How post-millennial young people are engaging with blockchain March 5, 2021
  • Machine intelligence – Spy agencies have high hopes for AI | Science & technology March 5, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates