{"title":"物联网网络安全检测","authors":"A. O. Prokofiev, Yulia S. Smirnova, D. Silnov","doi":"10.1109/SSDSE.2017.8071962","DOIUrl":null,"url":null,"abstract":"This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.","PeriodicalId":216748,"journal":{"name":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"The Internet of Things cybersecurity examination\",\"authors\":\"A. O. Prokofiev, Yulia S. Smirnova, D. Silnov\",\"doi\":\"10.1109/SSDSE.2017.8071962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.\",\"PeriodicalId\":216748,\"journal\":{\"name\":\"2017 Siberian Symposium on Data Science and Engineering (SSDSE)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Siberian Symposium on Data Science and Engineering (SSDSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSDSE.2017.8071962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Siberian Symposium on Data Science and Engineering (SSDSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSDSE.2017.8071962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper is dedicated to the study of the Internet of Things (IoT) as a potential object of cyberattacks. The main problems of cybersecurity, typical for the IoT devices, as well as the purpose of gaining unauthorized access to these devices are described. The experiment included Internet-Wide scanning for the purpose of detecting smart devices. All captured data were analyzed and systematized. The statistics including the list of countries by rate of IoT devices, accessible via the TELNET protocol, as well as the list of detected device types is provided in the article. The estimate of amount of IoT devices that can be compromised due to weak authentication is also presented.