Ajou University repository

System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
  • Choi, Seul Ki ;
  • Yang, Chung Huang ;
  • Kwak, Jin
Citations

SCOPUS

48

Citation Export

DC Field Value Language
dc.contributor.authorChoi, Seul Ki-
dc.contributor.authorYang, Chung Huang-
dc.contributor.authorKwak, Jin-
dc.date.issued2018-02-28-
dc.identifier.issn2288-1468-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/30138-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85043758772&origin=inward-
dc.description.abstractThe advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.-
dc.description.sponsorshipThis work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110) and by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2017-2015-0-00403) supervised by the IITP(Institute for Information & communications Technology Promotion) and by the Ajou University research fund.-
dc.language.isoeng-
dc.publisherKorean Society for Internet Information-
dc.subject.meshInternet of thing (IOT)-
dc.subject.meshIoT security-
dc.subject.meshLiving environment-
dc.subject.meshSecurity by designs-
dc.subject.meshSecurity incident-
dc.subject.meshSecurity monitoring-
dc.subject.meshSecurity threats-
dc.subject.meshSecurity vulnerabilities-
dc.titleSystem hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats-
dc.typeArticle-
dc.citation.endPage918-
dc.citation.number2-
dc.citation.startPage906-
dc.citation.titleKSII Transactions on Internet and Information Systems-
dc.citation.volume12-
dc.identifier.bibliographicCitationKSII Transactions on Internet and Information Systems, Vol.12 No.2, pp.906-918-
dc.identifier.doi10.3837/tiis.2018.02.022-
dc.identifier.scopusid2-s2.0-85043758772-
dc.identifier.urlhttp://www.itiis.org/digital-library/manuscript/file/1937/TIIS+Vol+12,+No+2-22.pdf-
dc.subject.keywordIoT security-
dc.subject.keywordSecurity monitoring-
dc.subject.keywordSecurity threat-
dc.subject.keywordSystem hardening-
dc.type.otherArticle-
dc.identifier.pissn1976-7277-
dc.description.isoafalse-
dc.subject.subareaInformation Systems-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.