Seguridad para IoT: solución para la gestión de eventos de seguridad en arquitecturas de Internet de las cosas
Due to the growth of IoT devices in different industries and markets in the recent years, and considering the need of development of security for these devices, it is desirable a security solution that protect IoT architectures. One interesting perspective for the development of security solutions i...
- Autores:
-
Moreno Guataquira, Nicolas
Morón Castro, Stefany
Vega Torres, Andrés Felipe
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2017
- Institución:
- Escuela Colombiana de Ingeniería Julio Garavito
- Repositorio:
- Repositorio Institucional ECI
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.escuelaing.edu.co:001/693
- Acceso en línea:
- https://catalogo.escuelaing.edu.co/cgi-bin/koha/opac-detail.pl?biblionumber=21083
https://repositorio.escuelaing.edu.co/handle/001/693
- Palabra clave:
- Seguridad de la información
Datos y mensajes
Security of the information
Data and messages
- Rights
- openAccess
- License
- Derechos Reservados - Escuela Colombiana de Ingeniería Julio Garavito
Summary: | Due to the growth of IoT devices in different industries and markets in the recent years, and considering the need of development of security for these devices, it is desirable a security solution that protect IoT architectures. One interesting perspective for the development of security solutions is to use an event management approach, knowing that an event could become an incident under certain circumstances where an information asset can be affected. This paper makes a proposal of security solution based on the use of security event management in IoT scenarios in order to identify suspicious activities. To achieve this, different vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing focus of attacks. Finally, in this paper three common scenarios of IoT attack are presented, describing exploited vulnerabilities, security events generated by the attack and responses that could be launched to help to decrease the impact of the attack on IoT devices. |
---|