{"id":"https://openalex.org/W2801218465","doi":"https://doi.org/10.3390/sym10050151","title":"An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices","display_name":"An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices","publication_year":2018,"publication_date":"2018-05-10","ids":{"openalex":"https://openalex.org/W2801218465","doi":"https://doi.org/10.3390/sym10050151","mag":"2801218465"},"language":"en","primary_location":{"id":"doi:10.3390/sym10050151","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050151","pdf_url":"https://www.mdpi.com/2073-8994/10/5/151/pdf?version=1525931843","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/10/5/151/pdf?version=1525931843","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069700732","display_name":"Hwankuk Kim","orcid":"https://orcid.org/0000-0002-4449-5821"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hwankuk Kim","raw_affiliation_strings":["Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112362997","display_name":"Taeun Kim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Taeun Kim","raw_affiliation_strings":["Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108658125","display_name":"Dae-il Jang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Daeil Jang","raw_affiliation_strings":["Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet &amp; Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do 58324, Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108658125"],"corresponding_institution_ids":[],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":1.7587,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.86258769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"10","issue":"5","first_page":"151","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8479822874069214},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7608901858329773},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6531161069869995},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6446083784103394},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5201207399368286},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5017576217651367},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4984931945800781},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.45506829023361206},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4309231638908386},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3648354709148407},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1413683295249939}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479822874069214},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7608901858329773},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6531161069869995},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6446083784103394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5201207399368286},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5017576217651367},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4984931945800781},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.45506829023361206},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4309231638908386},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3648354709148407},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1413683295249939},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym10050151","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050151","pdf_url":"https://www.mdpi.com/2073-8994/10/5/151/pdf?version=1525931843","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fd6a1ab7620d4dbe936e9317567021f5","is_oa":true,"landing_page_url":"https://doaj.org/article/fd6a1ab7620d4dbe936e9317567021f5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 10, Iss 5, p 151 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/10/5/151/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym10050151","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym10050151","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050151","pdf_url":"https://www.mdpi.com/2073-8994/10/5/151/pdf?version=1525931843","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6072120315","display_name":null,"funder_award_id":"funded","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"}],"funders":[{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2801218465.pdf","grobid_xml":"https://content.openalex.org/works/W2801218465.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1679846099","https://openalex.org/W1991470436","https://openalex.org/W1994410331","https://openalex.org/W2001637908","https://openalex.org/W2122516422","https://openalex.org/W2124628099","https://openalex.org/W2128623652","https://openalex.org/W2287679892","https://openalex.org/W2585956935","https://openalex.org/W2733358165","https://openalex.org/W2733765803","https://openalex.org/W2742532561","https://openalex.org/W2749472237","https://openalex.org/W2757491816","https://openalex.org/W2769150457","https://openalex.org/W2780923962","https://openalex.org/W2787335660","https://openalex.org/W2962944260","https://openalex.org/W6610362903","https://openalex.org/W6648194288","https://openalex.org/W6697037594","https://openalex.org/W6735654751","https://openalex.org/W6748505002"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4230824443","https://openalex.org/W2292210693"],"abstract_inverted_index":{"Since":[0],"2016,":[1],"Mirai":[2],"and":[3,17,64,71,80,121,153,183,216,247],"Persirai":[4],"malware":[5,32],"have":[6,86],"infected":[7],"hundreds":[8],"of":[9,11,13,27,111,124,219,250],"thousands":[10],"Internet":[12],"Things":[14],"(IoT)":[15],"devices":[16,49,60,95,120],"created":[18],"a":[19,122,186,221],"massive":[20],"IoT":[21,31,35,48,59,165],"botnet,":[22],"which":[23,37,73],"caused":[24],"distributed":[25],"denial":[26],"service":[28],"(DDoS)":[29],"attacks.":[30],"targets":[33],"vulnerable":[34,39,93,164],"devices,":[36],"are":[38,44,61],"to":[40,46,77,89,96,103,162,174,208],"security":[41,79,119],"risks.":[42],"Techniques":[43],"needed":[45],"prevent":[47],"from":[50],"being":[51],"exploited":[52],"by":[53,118],"attackers.":[54],"However,":[55],"unlike":[56],"high-performance":[57],"PCs,":[58],"lightweight,":[62],"low-power,":[63],"low-cost,":[65],"having":[66],"performance":[67,205,218,235,249],"limitations":[68],"regarding":[69,108],"processing":[70],"memory,":[72],"makes":[74],"it":[75,237],"difficult":[76],"install":[78],"anti-malware":[81],"programs.":[82],"Recently,":[83],"several":[84],"studies":[85],"been":[87],"attempted":[88],"quickly":[90],"search":[91],"for":[92],"internet-connected":[94],"solve":[97],"this":[98],"real":[99],"issue.":[100],"Issues":[101],"yet":[102],"be":[104],"studied":[105],"still":[106],"exist":[107],"these":[109],"types":[110],"internet-wide":[112,135,177],"scan":[113,136,178,214,234],"technologies,":[114,179],"such":[115,180],"as":[116,181],"filtering":[117],"shortage":[123],"collected":[125],"operating":[126],"system":[127],"(OS)":[128],"information.":[129],"This":[130],"paper":[131],"proposes":[132],"an":[133],"intelligent":[134],"model":[137,190],"that":[138],"improves":[139],"IP":[140,213,223],"state":[141],"scanning":[142],"with":[143,257],"advanced":[144],"internet":[145],"protocol":[146,150,233],"(IP)":[147],"randomization,":[148],"reactive":[149],"(port)":[151],"scanning,":[152,156],"OS":[154,251],"fingerprinting":[155,252],"applying":[157],"k*":[158],"algorithm":[159],"in":[160],"order":[161],"find":[163],"devices.":[166],"Additionally,":[167],"we":[168,196],"describe":[169],"the":[170,175,188,198,200,212,217,232,243,248],"experiment\u2019s":[171],"results":[172],"compared":[173],"existing":[176],"ZMap":[182,209],"Shodan.":[184],"As":[185],"result,":[187],"proposed":[189],"experimentally":[191],"shows":[192],"improved":[193,197],"performance.":[194],"Although":[195],"ZMap,":[199,246,256],"throughput":[201,215],"per":[202],"minute":[203],"(TPM)":[204],"is":[206,225,238,253],"similar":[207],"without":[210],"degrading":[211],"generating":[220],"single":[222],"address":[224],"about":[226,239,258],"118%":[227],"better":[228,241,254],"than":[229,242,255],"ZMap.":[230],"In":[231],"experiments,":[236],"129%":[240],"Censys":[244],"based":[245],"50%":[259],"accuracy.":[260]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
