Анализ уязвимостей встроенных информационных систем IoT-устройств посредством внедрения сети Honeypot; Информационные технологии в науке, управлении, социальной сфере и медицине; Ч. 1

Bibliografiske detaljer
Parent link:Информационные технологии в науке, управлении, социальной сфере и медицине: сборник научных трудов IV Международной научной конференции, 5-8 декабря 2017 г., Томск/ Национальный исследовательский Томский политехнический университет (ТПУ).— , 2017
Ч. 1.— 2017.— [С. 126-130]
Hovedforfatter: Исхакова А. О.
Andre forfattere: Исхаков А. Ю., Мещеряков Р. В.
Summary:Заглавие с титульного экрана
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level.
Sprog:russisk
Udgivet: 2017
Serier:Информационные системы и технологии
Fag:
Online adgang:http://earchive.tpu.ru/handle/11683/46209
Format: Electronisk Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=626010
Beskrivelse
Summary:Заглавие с титульного экрана
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level.