Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices

09/08/2022
by   Pascal Oser, et al.
0

IoT devices are present in many, especially corporate and sensitive, networks and regularly introduce security risks due to slow vendor responses to vulnerabilities and high difficulty of patching. In this paper, we want to evaluate to what extent the development of future risk of IoT devices due to new and unpatched vulnerabilities can be predicted based on historic information. For this analysis, we build on existing prediction algorithms available in the SAFER framework (prophet and ARIMA) which we evaluate by means of a large data-set of vulnerabilities and patches from 793 IoT devices. Our analysis shows that the SAFER framework can predict a correct future risk for 91 approach is a reliable means for network operators to efficiently detect and act on risks emanating from IoT devices in their networks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/23/2021

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Security risk assessment and prediction are critical for organisations d...
research
12/28/2022

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

Currently, the development of IoT firmware heavily depends on third-part...
research
06/20/2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

Nowadays, IoT devices integrate a wealth of third-party components (TPCs...
research
08/23/2023

Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

The Internet of Things (IoT) market is rapidly growing and is expected t...
research
05/12/2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference

The proliferation of Internet of Things (IoT) devices has made people's ...
research
07/05/2021

Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks

Cryptography techniques are essential for a robust and stable security d...
research
05/06/2021

A Cybersecurity Guide for Using Fitness Devices

The popularity of wearable devices is growing exponentially, with consum...

Please sign up or login with your details

Forgot password? Click here to reset