{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:02:23Z","timestamp":1747224143056,"version":"3.40.5"},"reference-count":21,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,1]]},"abstract":"<p>With the expansion and development of the internet protocol, the number of cybersecurity vulnerabilities has also increased. However, it is difficult to find a reliable way to detect the vulnerability in the internet-exposed asset. This paper proposes a new design of analysis platform that integrates the cybersecurity data and an internet-exposed asset search engine. Based on this design, it provides a convenient and up-to-date solution for the users to detect the devices' vulnerability crossing internet. Meanwhile, this platform offers suggestions in terms of resolving the cybersecurity problem.<\/p>","DOI":"10.4018\/ijitn.2020100109","type":"journal-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T13:15:36Z","timestamp":1603372536000},"page":"118-131","source":"Crossref","is-referenced-by-count":0,"title":["IACAP"],"prefix":"10.4018","volume":"12","author":[{"given":"Mingsheng","family":"Yin","sequence":"first","affiliation":[{"name":"Queen Mary University of London, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5687-1927","authenticated-orcid":true,"given":"Santiago","family":"Figueroa-Lorenzo","sequence":"additional","affiliation":[{"name":"CEIT-Basque Research and Technology Alliance (BRTA), San Sebasti\u00e1n, Spain & Universidad de Navarra, San Sebasti\u00e1n, Spain"}]},{"given":"Javier","family":"A\u00f1orga","sequence":"additional","affiliation":[{"name":"CEIT-Basque Research and Technology Alliance (BRTA), San Sebasti\u00e1n, Spain & Universidad de Navarra, San Sebasti\u00e1n, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9958-9799","authenticated-orcid":true,"given":"Saioa","family":"Arrizabalaga","sequence":"additional","affiliation":[{"name":"CEIT-Basque Research and Technology Alliance (BRTA), San Sebasti\u00e1n, Spain & Universidad de Navarra, San Sebasti\u00e1n, Spain"}]},{"given":"Yan","family":"Sun","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, UK"}]}],"member":"2432","reference":[{"key":"IJITN.2020100109-0","unstructured":"Abraham, R., Allodi, L., Arora, D., Carlage, N., Coles, M., Dugal, D., . . . Ma, A. Y. (2016). Common Vulnerability Scoring System v3.0: Specification Document. Academic Press."},{"key":"IJITN.2020100109-1","unstructured":"An & Guo. (2009). OVM: An Ontology for Vulnerability Management. In CSIIRW \u201909: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research. Knoxville, TN: ACM."},{"key":"IJITN.2020100109-2","unstructured":"Christey, S., & Martin, R. A. (2007). Vulnerability Type Distributions in CVE. Retrieved September 7, 2018 https:\/\/cwe.mitre.org\/documents\/vuln-trends\/index.html"},{"key":"IJITN.2020100109-3","unstructured":"CVE-Details. (2018). Tp-Link: Vulnerability Statistics. Retrieved July 7, 2018 https:\/\/www.cvedetails.com\/vendor\/11936\/?q=Tp-link"},{"key":"IJITN.2020100109-4","unstructured":"Desruisseaux, D. (2018). Cybersecurity Assessment \u2013 The Most Critical Step to Secure an Industrial Control System. Academic Press."},{"key":"IJITN.2020100109-5","unstructured":"Dulaunoy, A. (2018). CVE-Search (Common Vulnerabilities and Exposures). Academic Press."},{"key":"IJITN.2020100109-6","unstructured":"Fortune Names MITRE a \u2018Best Company to Work For\u2019 10 Years in a Row. (2011). Retrieved September 7, 2018 https:\/\/www.mitre.org\/news\/press-releases\/fortune-names-mitre-a-best-company-to-work-for-10-years-in-a-row"},{"key":"IJITN.2020100109-7","unstructured":"Franqueira, V. N. L., & Van Keulen, M. (2012). Analysis of the NIST Database towards the Composition of Vulnerabilities in Attack Scenarios. Centre for Telematics and Information Technology (CTIT)."},{"key":"IJITN.2020100109-8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1262"},{"key":"IJITN.2020100109-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.08.023"},{"key":"IJITN.2020100109-10","unstructured":"Knownsec 404 ZoomEye Team. (2019). ZoomEye Data Analysis Report - NEO Coolcam\u2019s Webcam Vulnerabilities. Author."},{"key":"IJITN.2020100109-11","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993960"},{"key":"IJITN.2020100109-12","unstructured":"MITRE Corporation. (2018a). Common Platform Enumeration: CPE Dictionary. Retrieved April 10, 2019 https:\/\/cpe.mitre.org\/"},{"key":"IJITN.2020100109-13","unstructured":"MITRE Corporation. (2018b). Common Vulnerabilities and Exposures (CVE). Retrieved https:\/\/cve.mitre.org\/"},{"key":"IJITN.2020100109-14","unstructured":"MITRE Corporation. (2018c). Common Weakness Enumeration: CWE. Retrieved April 10, 2019 https:\/\/cwe.mitre.org\/index.html"},{"key":"IJITN.2020100109-15","unstructured":"National Institute of Standards and Technology (NIST). (2018). National vulnerability database. Retrieved https:\/\/nvd.nist.gov\/vuln"},{"key":"IJITN.2020100109-16","unstructured":"\u00d6zkan, S. (2018). CVE-Details (Common Vulneravility Exposure). Retrieved www.cvedetails.com"},{"key":"IJITN.2020100109-17","unstructured":"Pham, S. (2018). Computer Virus Cripples Top Apple Supplier TSMC. Retrieved September 5, 2018 https:\/\/money.cnn.com\/2018\/08\/06\/technology\/tsmc-chip-supplier-virus\/"},{"key":"IJITN.2020100109-18","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2007.4282471"},{"key":"IJITN.2020100109-19","unstructured":"Security, O. (2019). The Exploit Database - Offensive Security. Retrieved https:\/\/www.exploit-db.com\/"},{"key":"IJITN.2020100109-20","doi-asserted-by":"crossref","unstructured":"Zhang, Ou, & Caragea. (2015). Predicting Cyber Risks Through National Vulnerability Database. Inf. Sec. J.: A Global Perspective,24(4\u20136), 194\u2013206.","DOI":"10.1080\/19393555.2015.1111961"}],"container-title":["International Journal of Interdisciplinary Telecommunications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=265153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:58:41Z","timestamp":1651881521000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITN.2020100109"}},"subtitle":["Internet-Exposed Assets Cybersecurity Analysis Platform"],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitn.2020100109","relation":{},"ISSN":["1941-8663","1941-8671"],"issn-type":[{"type":"print","value":"1941-8663"},{"type":"electronic","value":"1941-8671"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}