Skip to main content

Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering (FutureTech 2017, MUE 2017)

Abstract

This paper presents a method of building a security vulnerability information collection and management system in order to promptly identify which types of security vulnerability are included in IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Nutch, an open-source search engine created based on Lucene, provides excellent modularization for attaching various plug-ins. It enables Hadoop-based MapReduce and distributed file systems to perform tasks in multiple machines.

  2. 2.

    Gson is a Java library that converts Java objects to JSON expression.

  3. 3.

    Library, made by Apache Software Foundation, enables the reading and writing of Microsoft Office file format using pure Java language.

Acknowledgments

This work was supported by Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea government (MSIP). (No. B0717-16-0099, IoT Security Vulnerabilities Search, Sharing, and Testing Technology Development).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wonkang Jung .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kim, K., Lee, J., Jung, W. (2017). Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices. In: Park, J., Chen, SC., Raymond Choo, KK. (eds) Advanced Multimedia and Ubiquitous Engineering. FutureTech MUE 2017 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-10-5041-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5041-1_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5040-4

  • Online ISBN: 978-981-10-5041-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics