The search functionality is under construction.
The search functionality is under construction.

A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods

Taeeun KIM, Hwankuk KIM

  • Full Text Views

    0

  • Cite this

Summary :

Any Internet-connected device is vulnerable to being hacked and misused. Hackers can find vulnerable IoT devices, infect malicious codes, build massive IoT botnets, and remotely control IoT devices through C&C servers. Many studies have been attempted to apply various security features on IoT devices to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost devices and have limitations on performance of processing and memory, making it difficult to install heavy security functions. Instead of access to applying security functions on IoT devices, Internet-wide scanning (e.g., Shodan) studies have been attempted to quickly discover and take security measures massive IoT devices with weak security. Over the Internet, scanning studies remotely also exist realistic limitations such as low accuracy in analyzing security vulnerabilities due to a lack of device information or filtered by network security devices. In this paper, we propose a system for remotely collecting information from Internet-connected devices and using scanning techniques to identify and manage vulnerability information from IoT devices. The proposed system improves the open-source Zmap engine to solve a realistic problem when attempting to scan through real Internet. As a result, performance measurements show equal or superior results compared to previous Shodan, Zmap-based scanning.

Publication
IEICE TRANSACTIONS on Information Vol.E104-D No.11 pp.1805-1813
Publication Date
2021/11/01
Publicized
2021/08/02
Online ISSN
1745-1361
DOI
10.1587/transinf.2021NGP0004
Type of Manuscript
Special Section PAPER (Special Section on Next-generation Security Applications and Practice)
Category

Authors

Taeeun KIM
  Korea Information & Security Agency
Hwankuk KIM
  Sangmyung University

Keyword