CVE based classification of vulnerable IoT systems

06/30/2020
by   Grzegorz J. Blinowski, et al.
0

Common Vulnerabilities and Exposures database (CVE) is one of the largest publicly available source of software and hardware vulnerability data and reports. In this work we analyze the CVE database in the context of IoT device and system vulnerabilities. We introduce a real-world based classification of IoT systems. Then, we employ a SVM algorithm on selected subset of CVE database to classify "new" vulnerability records in this framework. The subset of interest consists of records that describe vulnerabilities of potential IoT devices of different applications, such as: home, industry, mobile controllers, networking, etc. The purpose of the classification is to develop and test an automatic system for recognition of vulnerable IoT devices and to test completes, sufficiency and reliability of CVE data in this respect.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2021

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Security risk assessment and prediction are critical for organisations d...
research
08/30/2022

Software Update Practices on Smart Home IoT Devices

Smart home IoT devices are known to be breeding grounds for security and...
research
01/08/2023

A Continent-Wide Assessment of Cyber Vulnerability Across Africa

As the internet penetration rate in Africa increases, so does the prolif...
research
04/24/2023

iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?

Evil twin attack on Wi-Fi network has been a challenging security proble...
research
09/28/2022

Does Collaborative Editing Help Mitigate Security Vulnerabilities in Crowd-Shared IoT Code Examples?

Background: With the proliferation of crowd-sourced developer forums, so...
research
09/24/2020

ThreatZoom: CVE2CWE using Hierarchical Neural Network

The Common Vulnerabilities and Exposures (CVE) represent standard means ...
research
07/14/2020

multiple layers of fuzzy logic to quantify vulnerabilies in iot

Quantifying vulnerabilities of network systems has been a highly controv...

Please sign up or login with your details

Forgot password? Click here to reset