A Search System to Identify Vulnerable IoT Devices 


Vol. 44,  No. 4, pp. 736-742, Apr.  2019
10.7840/kics.2019.44.4.736


PDF
  Abstract

Because IoT devices are always connected to the network, and are neglected in management after installation and distribution, they are easily exposed to various security threats. Although port scanning is widely used for vulnerability analysis of IoT devices, it is not easy to detect and respond to vulnerabilities of tremendous IoT devices. Therefore, a strategy is needed to identify IoT devices that are vulnerable to security threats and then selectively manage them due to the limited time and management cost. In this article, we introduce a search engine system to identify vulnerable IoT devices and then evaluate the system in the real-world network.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Kwon, "A Search System to Identify Vulnerable IoT Devices," The Journal of Korean Institute of Communications and Information Sciences, vol. 44, no. 4, pp. 736-742, 2019. DOI: 10.7840/kics.2019.44.4.736.

[ACM Style]

Young-Woo Kwon. 2019. A Search System to Identify Vulnerable IoT Devices. The Journal of Korean Institute of Communications and Information Sciences, 44, 4, (2019), 736-742. DOI: 10.7840/kics.2019.44.4.736.

[KICS Style]

Young-Woo Kwon, "A Search System to Identify Vulnerable IoT Devices," The Journal of Korean Institute of Communications and Information Sciences, vol. 44, no. 4, pp. 736-742, 4. 2019. (https://doi.org/10.7840/kics.2019.44.4.736)