Abstract
This paper presents a method of building a security vulnerability information collection and management system in order to promptly identify which types of security vulnerability are included in IoT devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Nutch, an open-source search engine created based on Lucene, provides excellent modularization for attaching various plug-ins. It enables Hadoop-based MapReduce and distributed file systems to perform tasks in multiple machines.
- 2.
Gson is a Java library that converts Java objects to JSON expression.
- 3.
Library, made by Apache Software Foundation, enables the reading and writing of Microsoft Office file format using pure Java language.
Acknowledgments
This work was supported by Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea government (MSIP). (No. B0717-16-0099, IoT Security Vulnerabilities Search, Sharing, and Testing Technology Development).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kim, K., Lee, J., Jung, W. (2017). Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices. In: Park, J., Chen, SC., Raymond Choo, KK. (eds) Advanced Multimedia and Ubiquitous Engineering. FutureTech MUE 2017 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-10-5041-1_35
Download citation
DOI: https://doi.org/10.1007/978-981-10-5041-1_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5040-4
Online ISBN: 978-981-10-5041-1
eBook Packages: EngineeringEngineering (R0)