Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Seul Ki | - |
dc.contributor.author | Yang, Chung Huang | - |
dc.contributor.author | Kwak, Jin | - |
dc.date.issued | 2018-02-28 | - |
dc.identifier.issn | 2288-1468 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/30138 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85043758772&origin=inward | - |
dc.description.abstract | The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment. | - |
dc.description.sponsorship | This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110) and by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2017-2015-0-00403) supervised by the IITP(Institute for Information & communications Technology Promotion) and by the Ajou University research fund. | - |
dc.language.iso | eng | - |
dc.publisher | Korean Society for Internet Information | - |
dc.subject.mesh | Internet of thing (IOT) | - |
dc.subject.mesh | IoT security | - |
dc.subject.mesh | Living environment | - |
dc.subject.mesh | Security by designs | - |
dc.subject.mesh | Security incident | - |
dc.subject.mesh | Security monitoring | - |
dc.subject.mesh | Security threats | - |
dc.subject.mesh | Security vulnerabilities | - |
dc.title | System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats | - |
dc.type | Article | - |
dc.citation.endPage | 918 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 906 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 12 | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, Vol.12 No.2, pp.906-918 | - |
dc.identifier.doi | 10.3837/tiis.2018.02.022 | - |
dc.identifier.scopusid | 2-s2.0-85043758772 | - |
dc.identifier.url | http://www.itiis.org/digital-library/manuscript/file/1937/TIIS+Vol+12,+No+2-22.pdf | - |
dc.subject.keyword | IoT security | - |
dc.subject.keyword | Security monitoring | - |
dc.subject.keyword | Security threat | - |
dc.subject.keyword | System hardening | - |
dc.type.other | Article | - |
dc.identifier.pissn | 1976-7277 | - |
dc.description.isoa | false | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.