Skip to main content

Intra-Network eXposure analyzer Utility Specification
draft-morais-iotops-inxu-01

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Sávyo Morais , Claudio Miceli de Farias
Last updated 2022-11-27 (Latest revision 2022-05-26)
RFC stream (None)
Intended RFC status (None)
Formats
Yang Validation 5 errors, 2 warnings
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document proposes the Intra-Network eXposure analyzer Utility (INXU) as a vulnerability management solution for IoT networks. The goal of INXU is to take advantage of the functions of the RFC 8520 to allow a Security Experts Team on protecting multiple heterogeneous IoT networks, even when there is a few or none private information of the networks. INXU identifies and analyzes the capability of an IoT device being exploited by an well known malicious activity. We also propose the Malicious Traffic Description (MTD), a data-model to describe traffic related to malicious activities.

Authors

Sávyo Morais
Claudio Miceli de Farias

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)