Ajou University repository

System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
  • Choi, Seul Ki ;
  • Yang, Chung Huang ;
  • Kwak, Jin
Citations

SCOPUS

48

Citation Export

Publication Year
2018-02-28
Publisher
Korean Society for Internet Information
Citation
KSII Transactions on Internet and Information Systems, Vol.12, pp.906-918
Keyword
IoT securitySecurity monitoringSecurity threatSystem hardening
Mesh Keyword
Internet of thing (IOT)IoT securityLiving environmentSecurity by designsSecurity incidentSecurity monitoringSecurity threatsSecurity vulnerabilities
All Science Classification Codes (ASJC)
Information SystemsComputer Networks and Communications
Abstract
The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/30138
DOI
https://doi.org/10.3837/tiis.2018.02.022
Fulltext

Type
Article
Funding
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110) and by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2017-2015-0-00403) supervised by the IITP(Institute for Information & communications Technology Promotion) and by the Ajou University research fund.
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.