Filters








4,567 Hits in 4.7 sec

A Study on Development of IoT Software Vulnerability (Using Fake Information) Response System based on Artificial Intelligence

Jang Mook KANG, Choel Hee YOON, Jiho SHIN
2018 International Journal of Engineering & Technology  
It is necessary to apply artificial intelligence technology for classification and automatic collection and analysis of IoT vulnerabilities for wearable devices and smart home devices through artificial  ...  Due to the operating structure of IoT, preparation of countermeasures to automatically analyze IoT software vulnerabilities based on artificial intelligence should be considered.  ...  The following figure considers continuous analysis and automation of IoT devices and software which are different from each other with the configuration for an automation system to cope with IoT software  ... 
doi:10.14419/ijet.v7i3.33.18598 fatcat:ofbug7op2zc3hmmzwt3ijzvnaa

CVE based classification of vulnerable IoT systems [article]

Grzegorz J. Blinowski, Paweł Piotrowski
2020 arXiv   pre-print
The purpose of the classification is to develop and test an automatic system for recognition of vulnerable IoT devices and to test completes, sufficiency and reliability of CVE data in this respect.  ...  In this work we analyze the CVE database in the context of IoT device and system vulnerabilities. We introduce a real-world based classification of IoT systems.  ...  Scope of this work and related research In this work, we propose a classification of device-related (i.e. not "pure software") vulnerability data for IoT and IIoT equipment.  ... 
arXiv:2006.16640v1 fatcat:edrnz5tpkjcd7cuxe4y6byud5u

Social Media Monitoring for IoT Cyber-Threats [article]

Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou
2021 arXiv   pre-print
Subsequently, based on our findings, we propose a novel social media monitoring system tailored to the IoT domain; the system allows users to identify recent/trending vulnerabilities and exploits on IoT  ...  Collecting Cyber-Threat Intelligence (e.g., zero-day vulnerabilities or trending exploits) from various online sources and utilizing it to proactively secure IoT systems or prepare mitigation scenarios  ...  An automatic vulnerability classification framework, based on conditions that activate vulnerabilities, and different ML techniques to construct a classifier with the highest Fmeasure are proposed and  ... 
arXiv:2109.04306v1 fatcat:4ijeqfajyjgbdfxpjfvnainhsi

A Technical Review of Wireless Security for the Internet of things: Software Defined Radio perspective

José Jesús Rugeles Uribe, Edward Paul Guillen, Leonardo S. Cardoso
2021 Journal of King Saud University: Computer and Information Sciences  
This paper presents a review of the vulnerabilities on wireless technologies that gives connectivity to IoT, and the experiences using Software Defined Radio SDR for implementing wireless attacks to IoT  ...  Security systems elements like door sensors, motion detectors can be sensitive to jammer attacks using software-defined radios.  ...  Wu et al. (2017) proposed an automatic jamming signal classification method using a convolutional neural network (CNN).  ... 
doi:10.1016/j.jksuci.2021.04.003 fatcat:oo76dneupvgkdpe323mawhzh4a

A Technical Review of Wireless security for the Internet of things: Software Defined Radio perspective [article]

Jose de Jesus Rugeles, Edward Paul Guillen, Leonardo S Cardoso
2020 arXiv   pre-print
On the IoT system model layer, perception layer was identified as the most vulnerable.  ...  Software-Defined Radio (SDR) technologies.  ...  [46] uses this classification to perform a vulnerability assessment on Bluetooth low energy technology in IoT systems. Moreover, the U.S.  ... 
arXiv:2009.10171v1 fatcat:u77yn7fohbedtjqpqjsmnxpar4

Multi-Source Knowledge Reasoning for Data-Driven IoT Security

Shuqin Zhang, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, Shujun Li
2021 Sensors  
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis.  ...  In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis  ...  Platform describes the scene information of the IoT security event, including the software, hardware, and operating system that may be affected by the vulnerability.  ... 
doi:10.3390/s21227579 pmid:34833653 pmcid:PMC8623156 fatcat:muvrsycdafarxeyzafmqax3ume

Design of Automation Environment for Analyzing Various IoT Malware

2021 Tehnički Vjesnik  
Using existing open source analysis tools suitable for various IoT malicious codes and QEMU, a virtualization software, the environment in which the actual malicious code will run is built, and the library  ...  It is inefficient in terms of time and cost to build an environment that analyzes malware one by one for analysis.  ...  an efficient environment configuration method for automatic analysis of malware based on dynamic analysis.  ... 
doi:10.17559/tv-20210202131602 fatcat:l7polrsqs5elvco5mwmbj3gupu

Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks

Tiberiu-Marian Georgescu, Bogdan Iancu, Madalina Zurini
2019 Sensors  
The proposed system is conceived as a semantic indexing solution of existing vulnerabilities and serves as an information tool for security management experts.  ...  The aim of this paper was to enhance the process of diagnosing and detecting possible vulnerabilities within an Internet of Things (IoT) system by using a named entity recognition (NER)-based solution.  ...  Related Works Under the topic of cybersecurity for IoT systems, several authors conducted research on sub-topics such as security vulnerabilities in IoT systems and automatic detection of vulnerabilities  ... 
doi:10.3390/s19153380 fatcat:vqqyvadryrbifngws4lj4waw7y

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices

Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi, Lin Jiang
2020 Future Internet  
With it, security vulnerabilities of IoT devices are emerging endlessly. The proliferation of security vulnerabilities will bring severe risks to users' privacy and property.  ...  Finally, we forecast and discuss the research directions on vulnerability analysis techniques of IoT devices.  ...  Its composition mainly includes hardware and software parts. (1) Hardware parts: • Logic chip. For complex devices, it has an operating system so that it needs multiple logic chips or CPU.  ... 
doi:10.3390/fi12020027 fatcat:rbg5eyfvj5h7lezzzyiyhjrpci

Automated Security Assessment for the Internet of Things [article]

Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar
2021 arXiv   pre-print
identifying the most vulnerable attack paths within an IoT network.  ...  To address this problem, we propose an automated security assessment framework for IoT networks.  ...  [22] used a vulnerability classification scheme for IoT devices based on real-world data.  ... 
arXiv:2109.04029v1 fatcat:i7dshjtas5dyzhlcasdkae4toa

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications  ...  They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities.  ...  CONCLUSION In this paper, we presented IOT SENTINEL, a system for automatic identification and security enforcement of IoT devices with potential security vulnerabilities.  ... 
doi:10.1109/icdcs.2017.283 dblp:conf/icdcs/MiettinenMHAST17 fatcat:gzkdn5irorhvxiicjxegg7gpvy

Malware Detection and Classification in IoT Network using ANN

Ayesha Jamal, Muhammad Faisal Hayat, Muhammad Nasir
2022 Mehran University Research Journal of Engineering and Technology  
Complexity and diversity of current malicious software present immense challenges for protecting IoT networks from malware attacks.  ...  Internet of Things is an emerging technology in the modern world and its network is expanding constantly. Meanwhile, IoT devices are a soft target and vulnerable to attackers.  ...  These issues have persuaded us to come up with an IoT-related dataset that contains sensors' reading data as an information source for data-driven IoT-based Intrusion Detection System (IDS) to properly  ... 
doi:10.22581/muet1982.2201.08 doaj:0bfd1c088ebb4199a37dd4855d001439 fatcat:x7bvatk7azbcvgon7zzlehntv4

multiple layers of fuzzy logic to quantify vulnerabilies in iot [article]

Mohammad Shojaeshafiei, Letha Etzkorn, Michael Anderson
2020 arXiv   pre-print
Quantifying vulnerabilities of network systems has been a highly controversial issue in the fields of network security and IoT.  ...  Finally, we propose our Multi-layered Fuzzy Logic (MFL) approach based on Goal question Metrics (GQM) to quantify network security and IoT (Mobile Devices) vulnerability in DOT.  ...  [25] studied the vulnerable devices on the IoT and provided an evaluation of existing vulnerabilities in the IoT system.  ... 
arXiv:2007.07155v1 fatcat:cyo3ou72zvfldkaytdyqkwhcqu

Risk Prediction of IoT Devices Based on Vulnerability Analysis

Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl
2022 ACM Transactions on Privacy and Security  
Based on past vulnerability data and vendor patch intervals for device models, SAFER extrapolates those observations into the future using different automatically parameterized prediction models.  ...  Based on that, SAFER also estimates an indicator for future security risks. This enables users to be aware of devices exposing high risks in the future.  ...  Systematically extracting device information is a non-trivial task for IoT and especially challenging for those IoT devices that are part of an industrial control system (ICS) or some other cyberphysical  ... 
doi:10.1145/3510360 fatcat:dcrua4jklfe2bhb6y7kwggttqy

DEVICE CLASSIFICATION IN ROBOT ASSISTED SURGERY: A REVIEW

Meghana P. Lokhande, Dipti Durgesh Patil
2021 Indian Journal of Computer Science and Engineering  
In this review paper, goal is to study various frameworks for IoT device classification possible in Tele robotic surgery and summarizes the classification algorithm.  ...  Internet of Things (IoT) domain gradually growing in information technology and telecommunications systems area considering its size and complexity.  ...  The system architecture of the multi-stage classifier for IoT device classification shows in Fig. 2 .  ... 
doi:10.21817/indjcse/2021/v12i6/211206200 fatcat:fe7vwbwikfesvhrinsekojwuhq
« Previous Showing results 1 — 15 out of 4,567 results