Анализ уязвимостей встроенных информационных систем IoT-устройств посредством внедрения сети Honeypot
| Parent link: | Информационные технологии в науке, управлении, социальной сфере и медицине: сборник научных трудов IV Международной научной конференции, 5-8 декабря 2017 г., Томск/ Национальный исследовательский Томский политехнический университет (ТПУ).— , 2017 Ч. 1.— 2017.— [С. 126-130] |
|---|---|
| Autore principale: | |
| Altri autori: | , |
| Riassunto: | Заглавие с титульного экрана The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level. |
| Lingua: | russo |
| Pubblicazione: |
2017
|
| Serie: | Информационные системы и технологии |
| Soggetti: | |
| Accesso online: | http://earchive.tpu.ru/handle/11683/46209 |
| Natura: | Elettronico Capitolo di libro |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=626010 |
| Riassunto: | Заглавие с титульного экрана The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level. |
|---|