Syed S. Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd
{"title":"物联网网络的攻击媒介","authors":"Syed S. Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd","doi":"10.1109/ICSSA45270.2018.00019","DOIUrl":null,"url":null,"abstract":"The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An Attack Vector for IoT Networks\",\"authors\":\"Syed S. Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd\",\"doi\":\"10.1109/ICSSA45270.2018.00019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.\",\"PeriodicalId\":223442,\"journal\":{\"name\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"volume\":\"2013 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSA45270.2018.00019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Software Security and Assurance (ICSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSA45270.2018.00019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.