Seguridad para IoT: solución para la gestión de eventos de seguridad en arquitecturas de Internet de las cosas

Due to the growth of IoT devices in different industries and markets in the recent years, and considering the need of development of security for these devices, it is desirable a security solution that protect IoT architectures. One interesting perspective for the development of security solutions i...

Full description

Autores:
Moreno Guataquira, Nicolas
Morón Castro, Stefany
Vega Torres, Andrés Felipe
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2017
Institución:
Escuela Colombiana de Ingeniería Julio Garavito
Repositorio:
Repositorio Institucional ECI
Idioma:
spa
OAI Identifier:
oai:repositorio.escuelaing.edu.co:001/693
Acceso en línea:
https://catalogo.escuelaing.edu.co/cgi-bin/koha/opac-detail.pl?biblionumber=21083
https://repositorio.escuelaing.edu.co/handle/001/693
Palabra clave:
Seguridad de la información
Datos y mensajes
Security of the information
Data and messages
Rights
openAccess
License
Derechos Reservados - Escuela Colombiana de Ingeniería Julio Garavito
Description
Summary:Due to the growth of IoT devices in different industries and markets in the recent years, and considering the need of development of security for these devices, it is desirable a security solution that protect IoT architectures. One interesting perspective for the development of security solutions is to use an event management approach, knowing that an event could become an incident under certain circumstances where an information asset can be affected. This paper makes a proposal of security solution based on the use of security event management in IoT scenarios in order to identify suspicious activities. To achieve this, different vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing focus of attacks. Finally, in this paper three common scenarios of IoT attack are presented, describing exploited vulnerabilities, security events generated by the attack and responses that could be launched to help to decrease the impact of the attack on IoT devices.