IEEE/ICACT20220314 Slide.17        [Big Slide]       [YouTube] Oral Presentation
As for the attack strategy we simulated all of the 17 attack types for one-minute par packet capture each, using the attacking tools and techniques we have listed here. In order to have a realistic target, we have used the IoT devices and the deliberately vulnerable machines, and MQTT brokers as a victim machines.

[Go to Next Slide]
Select Voice: