2020
DOI: 10.3390/s20113048
|View full text |Cite
|
Sign up to set email alerts
|

Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases

Abstract: Shodan is a search engine for exploring the Internet and thus finding connected devices. Its main use is to provide a tool for cybersecurity researchers and developers to detect vulnerable Internet-connected devices without scanning them directly. Due to its features, Shodan can be used for performing cybersecurity audits on Internet of Things (IoT) systems and devices used in applications that require to be connected to the Internet. The tool allows for detecting IoT device vulnerabilities that are related to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 55 publications
0
11
0
2
Order By: Relevance
“…ey introduced how to automate the vulnerability assessment of IOT devices through Shodan script [7]. Many scholars also analyze from a technical point of view.…”
Section: State Of the Artmentioning
confidence: 99%
“…ey introduced how to automate the vulnerability assessment of IOT devices through Shodan script [7]. Many scholars also analyze from a technical point of view.…”
Section: State Of the Artmentioning
confidence: 99%
“…In this experiment, we use the scanning results of Shodan [ 33 , 34 ] as the standard to scan devices in the Shodan database that provide FTP, SSH, Telnet, SMTP, HTTP, and POP3 services in China. According to the data in the Shodan database on 5 June 2020, there are 1,037,806 devices providing FTP services in China.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The botnet Mirai in 2016 abused IoT devices to perform Distributed Denial of Service (DDoS) attacks. One of the challenges with regard to IoT security are the limited hardware resources of IoT devices which hinders the implementation of common encryption and security standards [10]. IoT security issues arise in the collection, submission, storage as well as processing of IoT data [1].…”
Section: Iot and Iiot Securitymentioning
confidence: 99%