{"title":"The Internet of Things cybersecurity examination","authors":"A. O. Prokofiev, Yulia S. Smirnova, D. Silnov","doi":"10.1109/SSDSE.2017.8071962","DOIUrl":null,"url":null,"abstract":"This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.","PeriodicalId":216748,"journal":{"name":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSDSE.2017.8071962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.