The Internet of Things cybersecurity examination

A. O. Prokofiev, Yulia S. Smirnova, D. Silnov
{"title":"The Internet of Things cybersecurity examination","authors":"A. O. Prokofiev, Yulia S. Smirnova, D. Silnov","doi":"10.1109/SSDSE.2017.8071962","DOIUrl":null,"url":null,"abstract":"This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.","PeriodicalId":216748,"journal":{"name":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSDSE.2017.8071962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.
物联网网络安全检测
本文致力于研究物联网(IoT)作为网络攻击的潜在对象。描述了物联网设备典型的网络安全主要问题,以及对这些设备进行未经授权访问的目的。该实验包括全互联网扫描,目的是检测智能设备。所有捕获的数据都进行了分析和系统化。统计数据包括通过TELNET协议访问的物联网设备率的国家列表,以及检测到的设备类型列表,在文章中提供。还提出了由于弱身份验证而可能受到损害的物联网设备数量的估计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信