Browse > Article
http://dx.doi.org/10.33778/kcsa.2019.19.3.051

Device Identification System for Corporate Internal Network Visibility in IoT Era  

Lee, Dae-Hyo (GENIANS, INC.)
Kim, Yong-Kwon (GENIANS, INC.)
Lee, Dong-Bum (GENIANS, INC.)
Kim, Hyeob (GENIANS, INC.)
Publication Information
Abstract
In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.
Keywords
Device Identification System; Network Visibility; Enterprise Internal Network; IoT Security; BYOD;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Gartner, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020", http://www.gartner.com/newsroom/id/2636073. Accessed 31 July 2019, 2011.
2 Shaji, R. S., Dev, V. S., & Brindha, T. "A methodological review on attack and defense strategies in cyber warfare", Wireless Networks, Vol.25, No.6, pp.3323-3334, 2019.   DOI
3 Park, W., Na, O., & Chang, H, "An exploratory research on advanced smart media security design for sustainable intelligence information system", Multimedia Tools and Applications, Vol.75, No.11, pp.6059-6070, 2016.   DOI
4 Atzori, L., Iera, A., & Morabito, G, "The internet of things: A survey", Computer networks, Vol.54, No.15, pp.2787-2805, 2010.   DOI
5 Kim, H., Kwon, H., & Kim, K. K, "Modified cyber kill chain model for multimedia service environments", Multimedia Tools and Applications, Vol.78, No.3, pp.3153-3170, 2019.   DOI
6 전정훈, "사물 인터넷의 보안 위협 요인들에 대한 분석", 융합보안논문지, 제15권, 제7호, pp.47-53, 2015.
7 최관, 김민지, "기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로", 융합보안논문지, 제17권, 제5호, pp.101-110, 2017.
8 한슬기, 김명주. "사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용", 융합보안논문지, 제18권, 제2호, pp.49-58, 2018.
9 Cox, G, "Managing the risks of shadow IoT", Network Security, pp.14-17, 2019.
10 Zhou, L., & Chao, H. C, "Multimedia traffic security architecture for the internet of things", IEEE Network, Vol.25, No.3, pp.35-40, 2011.   DOI
11 Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A, "A review of bring your own device on security issues", Sage Open, pp.1-11, 2015.
12 Disterer, G., & Kleiner, C, "BYOD bring your own device", Procedia Technology, Vol.9, pp.43-53, 2013.   DOI
13 Trend Micro, "Trend Micro Research Finds Major Lack of IoT Security Awareness", https://newsroom.trendmicro.com/press-release/commercial/trend-micro-research-finds-major-lack-iot-security-awareness. Accessed 31 July 2019, 2018.