Paper
19 November 2024 Vulnerability detection of IoT information cloud interaction process under penetration testing
Lei Yun, Dan Li
Author Affiliations +
Proceedings Volume 13397, Fourth International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024); 133970R (2024) https://doi.org/10.1117/12.3052707
Event: 4th International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024), 2024, Guiyang, China
Abstract
The Internet of Things technology makes a large number of devices connected to the Internet, resulting in massive interactive data. However, data is susceptible to hacker attacks and malicious exploitation during the interaction process, resulting in serious data leakage and privacy issues. Penetration testing can simulate real attack behavior, help identify vulnerabilities and security vulnerabilities in the process of IoT information cloud interaction, and prevent malicious attackers from exploiting vulnerabilities to invade systems and obtain sensitive information. Therefore, vulnerability detection in the process of IoT information cloud interaction under penetration testing is proposed. By evaluating the defense mechanism status of the Internet of Things through bidirectional penetration, a machine learning model based on time Markov vector features is constructed. The model is trained using historical session flow data to identify session flows containing sensitive information. At the same time, hidden Markov models are used to classify normal information interaction behavior samples to detect security vulnerabilities during the information interaction process. The experimental results show that the success rate of using the proposed method for vulnerability detection in the process of IoT information cloud interaction remains above 98%. Relatively high, it can accurately detect vulnerabilities generated during the interaction process of IoT information cloud, ensuring the security of IoT.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Lei Yun and Dan Li "Vulnerability detection of IoT information cloud interaction process under penetration testing", Proc. SPIE 13397, Fourth International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024), 133970R (19 November 2024); https://doi.org/10.1117/12.3052707
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet of things

Data processing

Network security

Clouds

Data modeling

Information security

Computer security

Back to Top