Log Poisoning Attacks in IoT: Methodologies, Evasion, Detection, Mitigation, and Criticality Analysis
Log poisoning is a cyber-attack where adversaries manipulate systems’ log files to conceal their activities or execute malicious codes.This paper thoroughly examines log poisoning attacks, focusing on demonstrating methodologies applied to prevalent Internet of Things (IoT) platforms, such as the Raspberry Pi.We introduce a novel technique t