Анализ уязвимостей встроенных информационных систем IoT-устройств посредством внедрения сети Honeypot

Dettagli Bibliografici
Parent link:Информационные технологии в науке, управлении, социальной сфере и медицине: сборник научных трудов IV Международной научной конференции, 5-8 декабря 2017 г., Томск/ Национальный исследовательский Томский политехнический университет (ТПУ).— , 2017
Ч. 1.— 2017.— [С. 126-130]
Autore principale: Исхакова А. О.
Altri autori: Исхаков А. Ю., Мещеряков Р. В.
Riassunto:Заглавие с титульного экрана
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level.
Lingua:russo
Pubblicazione: 2017
Serie:Информационные системы и технологии
Soggetti:
Accesso online:http://earchive.tpu.ru/handle/11683/46209
Natura: Elettronico Capitolo di libro
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=626010
Descrizione
Riassunto:Заглавие с титульного экрана
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects and control devices can lead to major risks and various negative consequences. The article details the conduct of the research experiment on the introduction of a honeypot trap into a smart house IoT-network. The results allow to make a conclusion about the ways of attacks on smart objects, the protocols and services use, the influence of the devices placement in the network on their security level.