Intra-Network eXposure analyzer Utility Specification
draft-morais-iotops-inxu-01
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Sávyo Morais , Claudio Miceli de Farias | ||
Last updated | 2022-11-27 (Latest revision 2022-05-26) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Yang Validation | 5 errors, 2 warnings | ||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document proposes the Intra-Network eXposure analyzer Utility (INXU) as a vulnerability management solution for IoT networks. The goal of INXU is to take advantage of the functions of the RFC 8520 to allow a Security Experts Team on protecting multiple heterogeneous IoT networks, even when there is a few or none private information of the networks. INXU identifies and analyzes the capability of an IoT device being exploited by an well known malicious activity. We also propose the Malicious Traffic Description (MTD), a data-model to describe traffic related to malicious activities.
Authors
Sávyo Morais
Claudio Miceli de Farias
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)