Abstract

Improperly secured Internet of Things (IoT) devices have been commandeered by bot herders and other malicious attackers. Organisations need a way to identify and track these IoT devices, which are often brought in unofficially by users. But network administrators face a number of challenges in tracking IoT devices across their organisation. Improperly secured Internet of Things (IoT) devices have been exploited by bot herders and other malicious attackers. So organisations need a way to identify and track these devices. Pranshu Bajpai, Aditya Sood and Richard J Enbody look at the difficulty of defining identifying characteristics of IoT devices due to their immensely diverse nature. They offer a model to identify IoT devices in networks using a variety of scanning techniques and they discuss the pros and cons of discovery techniques, presenting results from actual scans.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.