ASIA unversity:Item 310904400/115590
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 94286/110023 (86%)
造訪人次 : 21665663      線上人數 : 615
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/115590


    請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/115590


    題名: Securing heterogeneous embedded devices against XSS attack in intelligent IoT system
    作者: Chaudh, Pooja;Chaudharya, Pooja;Bhoosha, Brij;Gupta, Brij Bhooshan;Singha, A.K.;Singha, A.K.
    貢獻者: 資訊電機學院資訊工程學系
    關鍵詞: Intelligent IoT System;Embedded device security;Firmware security;Device management web interface vulnerabilities;Cross-site scripting (XSS) attack;Web application vulnerability
    日期: 2022-03-01
    上傳時間: 2023-03-29 02:50:18 (UTC+0)
    出版者: 亞洲大學
    摘要: Today, we are living in the realm of Internet of Things (IoT) where simple objects are embedded with the capabilities to understand and operate in its surroundings for offering distinct services to the users. These objects are shipped with their user interfaces that facilitate user to perform administrative activities on the devices using a web browser linked to the device's server. Cross-Site Scripting (XSS) is the most prevalent web application's vulnerability, exploited by an attacker to compromise the embedded devices. This research work is focused towards the development of an approach to defend against XSS attack to safeguard embedded devices deployed in intelligent IoT system. It performs identification through comparing injected strings with the blacklisted attack vectors and mitigates its harmful effects by implementing filtering method in an optimized fashion. It is a fog-enabled approach that operates locally to identify the compromised device within the IoT network. We demonstrate attack exploitation on two smart devices including digital IP Camera and wireless router and then tested the performance of our proposed approach on them. The experimental results highlight the efficacy of the approach as it attains an accuracy of 0.9 and above, on both the tested platforms.
    顯示於類別:[資訊工程學系] 期刊論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML268檢視/開啟


    在ASIAIR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋