본문 바로가기
  • Home

IoT System Cyber Threat Information Sharing Method

  • Journal of Internet of Things and Convergence
  • Abbr : JKIOTS
  • 2023, 9(5), pp.101-107
  • DOI : 10.20465/KIOTS.2023.9.5.101
  • Publisher : The Korea Internet of Things Society
  • Research Area : Engineering > Computer Science > Internet Information Processing
  • Received : August 26, 2023
  • Accepted : October 3, 2023
  • Published : October 31, 2023

Lee, Hyung Woo 1

1한신대학교

Accredited

ABSTRACT

In order to proactively respond to increasingly intelligent and sophisticated cyber-attacks targeting heterogeneous IoT systems, there is a need for techniques that efficiently share threat information collected when intrusion incidents occur. Techniques should be presented for generating various IoC(Indicators of Compromise) information from various digital forensic artifacts collected from various IoT devices, and for sharing this information through CTI(Cyber Threat Intelligence) systems such as MISP. In this study, when various artifacts are collected upon intrusion incidents in IoT devices, we propose a method for generating detailed attack information as IoCs and sharing threat information efficiently by applying the Hub & Spoke model in CTI systems like MISP. The application of the proposed threat information sharing model is expected to enhance response time and detection performance in the cyber incident analysis process, thus improving the ability to detect and respond to intelligent cyber-attacks targeting IoT devices

Citation status

* References for papers published after 2023 are currently being built.