Landing reinforcement learning onto smart scanning of the Internet of Things

J Qu, X Ma, W Liu, H Sang, J Li, L Xue… - … -IEEE Conference on …, 2022 - ieeexplore.ieee.org
Cyber search engines, such as Shodan and Censys, have gained popularity due to their
strong capability of indexing the Internet of Things (IoT). They actively scan and fingerprint …

[HTML][HTML] A critical analysis of the industrial device scanners' potentials, risks, and preventives

M Borhani, GS Gaba, J Basaez, I Avgouleas… - Journal of Industrial …, 2024 - Elsevier
Industrial device scanners allow anyone to scan devices on private networks and the
Internet. They were intended as network security tools, but they are commonly exploited as …

No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild

M Karl, M Musch, G Ma, M Johns, S Lekies - Proceedings of the 22nd …, 2022 - dl.acm.org
Nowadays, applications expose administrative endpoints to the Web that can be used for a
plethora of security sensitive actions. Typical use cases range from running small snippets of …

Network monitoring and enumerating vulnerabilities in large heterogeneous networks

M Laštovička, M Husák, L Sadlek - NOMS 2020-2020 IEEE/IFIP …, 2020 - ieeexplore.ieee.org
In this paper, we present an empirical study on vulnerability enumeration in computer
networks using common network probing and monitoring tools. We conducted active …

Identifying vulnerabilities using internet-wide scanning data

J O'Hare, R Macfarlane, O Lo - 2019 IEEE 12th International …, 2019 - ieeexplore.ieee.org
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect
active reconnaissance results for online devices. Access to this information is provided …

Network attack surface simplification for red and blue teams

D Everson, L Cheng - 2020 IEEE Secure Development …, 2020 - ieeexplore.ieee.org
Network port scans are a key first step to developing a true understanding of a network-
facing attack surface. However in large-scale networks, the data resulting from such scans …

[PDF][PDF] Modeling vulnerable internet of things on shodan and censys: An ontology for cyber security

M Arnaert, Y Bertrand, K Boudaoud - Proceedings of the Tenth …, 2016 - arnaert.fr
Internet, managing security can become a very difficult task for Information Technology (IT)
and security managers. In order to find vulnerabilities for these devices, we can use search …

E-CIS: Edge-based classifier identification scheme in green & sustainable IoT smart city

Y Sun, J Liu, AK Bashir, U Tariq, W Liu, K Chen… - Sustainable Cities and …, 2021 - Elsevier
Smart city has brought the unprecedented development and application of Internet of things
(IoT) devices. Meanwhile, since both of the quantity and the type of IoT devices are growing …

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

J Choi, A Anwar, A Alabduljabbar, H Alasmary… - Computer Networks, 2022 - Elsevier
The lack of security measures among the Internet of Things (IoT) devices and their persistent
online connection gives adversaries a prime opportunity to target them or even abuse them …

[HTML][HTML] Understanding Local Government Cybersecurity Policy: A Concept Map and Framework

ST Hossain, T Yigitcanlar, K Nguyen, Y Xu - Information, 2024 - mdpi.com
Cybersecurity is a crucial concern for local governments as they serve as the primary
interface between public and government services, managing sensitive data and critical …