4.2 Article

Management platform of threats information in IoT environment

Journal

Publisher

SPRINGER HEIDELBERG
DOI: 10.1007/s12652-017-0581-6

Keywords

Vulnerability information; Structured threat information expression (STIX); Internet wide scan; IoT devices vulnerability correlation mapping; Management platform of threats information

Funding

  1. Institute for Information & communications Technology Promotion (IITP) grant - Korea government (MSIT) [2016-0-00193]

Ask authors/readers for more resources

Recently, the use of IoT devices in living environments has increased due to the development of various wireless communication technologies. As the number of types of IoT devices has grown exponentially, many kinds of insecure operating systems and open source software programs are being used. As they run with security vulnerabilities, IoT devices using such OS and software can be targeted by malicious attackers. In addition, due to the operating characteristics of IoT devices, it is difficult to apply security patches immediately when vulnerabilities are found. Accordingly, there is an increasing need for managing and sharing cyber security threat information in order to prevent security threats and accidents. This paper suggests a platform structure and application method for collecting, analyzing and sharing vulnerability information about IoT devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available