Skip to main content

A Study on the Management Structure of Vulnerability Information in IoT Environment

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering (FutureTech 2017, MUE 2017)

Abstract

Due to the recent development of wireless network technologies, the use of IoT devices is increasing as well as security threats caused by vulnerable security. To prevent security threats and accidents, it is necessary to share information on cyber security threats. This paper proposes a platform of sharing vulnerability information regarding IoT devices, and contents of shared information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Symantec, IoT devices being increasingly used for DDoS attacks. http://www.symantec.com/connect/blogs/iot-devices-being-increasingly-used-ddos-attacks

  2. Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 542–553. ACM (2015)

    Google Scholar 

  3. Barnum, S.: Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIXâ„¢). MITRE Corporation 11 (2012)

    Google Scholar 

  4. Na, S., Kim, T., Kim, H.: A study on the classification of common vulnerabilities and exposures using naïve bayes. In: Proceedings of the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications. BWCCA (2016)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP). (No. B0717-16-0099, IoT Security Vulnerabilities Search, Sharing and Testing Technology Development).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hwankuk Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ko, E., Kim, T., Kim, H. (2017). A Study on the Management Structure of Vulnerability Information in IoT Environment. In: Park, J., Chen, SC., Raymond Choo, KK. (eds) Advanced Multimedia and Ubiquitous Engineering. FutureTech MUE 2017 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-10-5041-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5041-1_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5040-4

  • Online ISBN: 978-981-10-5041-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics