{"id":"https://openalex.org/W4400409866","doi":"https://doi.org/10.1109/access.2024.3425062","title":"I-RECON: An IoT-Based Search Engine for Internet-Facing Services Vulnerability Reconnaissance","display_name":"I-RECON: An IoT-Based Search Engine for Internet-Facing Services Vulnerability Reconnaissance","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400409866","doi":"https://doi.org/10.1109/access.2024.3425062"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3425062","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3425062","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100204014","display_name":"Vahid Moghiss","orcid":null},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Vahid Moghiss","raw_affiliation_strings":["Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103011806","display_name":"Alireza Shameli-Sendi","orcid":"https://orcid.org/0000-0002-4723-5793"},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Alireza Shameli-Sendi","raw_affiliation_strings":["Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":83},"biblio":{"volume":"12","issue":null,"first_page":"96100","last_page":"96112"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.64555734},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.59854734},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4114411}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81655467},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.64555734},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.61780834},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.59854734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52448004},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47751302},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.4568525},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4242086},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4114411},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3425062","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3425062","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":32,"referenced_works":["https://openalex.org/W2124628099","https://openalex.org/W2465998890","https://openalex.org/W2733684447","https://openalex.org/W2808266100","https://openalex.org/W2885407417","https://openalex.org/W2887920472","https://openalex.org/W2888542119","https://openalex.org/W2895461291","https://openalex.org/W2936423181","https://openalex.org/W2944922970","https://openalex.org/W2954159401","https://openalex.org/W2966059442","https://openalex.org/W2967229930","https://openalex.org/W2982153255","https://openalex.org/W2998681099","https://openalex.org/W3019791958","https://openalex.org/W3030186388","https://openalex.org/W3048290301","https://openalex.org/W3101154995","https://openalex.org/W3102768552","https://openalex.org/W3124265794","https://openalex.org/W3127127463","https://openalex.org/W3128124346","https://openalex.org/W3130855082","https://openalex.org/W3166357681","https://openalex.org/W3194478758","https://openalex.org/W3194568348","https://openalex.org/W3203223634","https://openalex.org/W3216223689","https://openalex.org/W4206712088","https://openalex.org/W4213419327","https://openalex.org/W4256690983"],"related_works":["https://openalex.org/W54497855","https://openalex.org/W3125814499","https://openalex.org/W3121970507","https://openalex.org/W217960748","https://openalex.org/W2110028391","https://openalex.org/W2094012830","https://openalex.org/W2090827041","https://openalex.org/W2079194830","https://openalex.org/W2032233321","https://openalex.org/W187246281"],"abstract_inverted_index":{"One":[0],"of":[1,4,20,65,119,173,197,216,235,251,258,285,297,304,315,331,340,352,356,361],"the":[2,18,21,41,49,62,76,100,104,159,171,203,217,230,233,240,245,249,262,283,295,302,305,313,316,328,338,341,348,354,359],"needs":[3],"an":[5],"organization":[6],"or":[7],"a":[8,195,236,256],"country":[9],"with":[10,170],"many":[11],"and":[12,31,59,85,121,130,147,155,175,208,238,287,319,350,367,377],"diverse":[13],"services":[14,22,53,144],"is":[15,108,125,221,255],"to":[16,47,78,94,97,111,133,152,164,182,186,228,267,276,293,301,311,336],"analyze":[17],"vulnerabilities":[19],"so":[23,308],"that":[24,114,168],"appropriate":[25],"security":[26],"measures":[27],"can":[28],"be":[29,265],"implemented":[30],"deployed":[32],"accordingly.":[33],"Many":[34],"search":[35,70,210,268],"engines":[36],"have":[37,374],"been":[38,375],"designed":[39],"in":[40,248,334,363,370],"last":[42],"two":[43],"decades,":[44],"which":[45,124,220,254],"aim":[46],"collect":[48],"necessary":[50],"information":[51,101,122,189,247,299,323],"from":[52,190],"based":[54],"on":[55,244],"requested":[56,102,157],"scans.":[57],"Shodan":[58],"Censys":[60],"are":[61,73,180],"most":[63],"famous":[64,364],"these":[66,137],"engines.":[67],"In":[68,327],"current":[69],"engines,":[71],"users":[72,179],"not":[74,140,310],"given":[75],"capability":[77],"engineer":[79],"their":[80],"searches":[81],"by":[82,103,158],"managing":[83,148],"detailed":[84],"effective":[86],"variables.":[87],"This":[88],"includes":[89],"making":[90],"adjustable":[91],"variables":[92],"related":[93],"scanning":[95,120,278,288,306],"processes":[96],"intelligently":[98],"extract":[99,188],"user.":[105,160],"Additionally,":[106],"there":[107],"no":[109],"facility":[110],"track":[112],"errors":[113],"occur":[115],"at":[116,324],"different":[117,371],"stages":[118],"extraction,":[123],"essential":[126],"for":[127,145,205,232,269],"identifying":[128],"bottlenecks":[129],"adopting":[131],"methods":[132],"address":[134],"them.":[135],"Moreover,":[136],"systems":[138],"do":[139],"provide":[141],"real-time":[142],"identification":[143],"controlling":[146],"cyber":[149],"incidents":[150],"according":[151,300],"specific":[153,166],"ports":[154],"protocols":[156],"They":[161],"also":[162],"fail":[163],"issue":[165],"warnings":[167],"align":[169],"policies":[172],"researchers":[174],"industrial":[176],"owners.":[177],"Furthermore,":[178],"unable":[181],"define":[183],"advanced":[184],"queries":[185],"accurately":[187],"existing":[191],"big":[192],"data":[193],"using":[194],"variety":[196],"logical":[198],"operators.":[199],"These":[200],"limitations":[201],"underscore":[202],"need":[204],"more":[206],"sophisticated":[207],"customizable":[209],"engine":[211],"capabilities.":[212],"The":[213,226,274,291],"new":[214],"strengths":[215],"proposed":[218,342],"engine,":[219,343],"called":[222],"I-Recon,":[223],"are:":[224],"1)":[225],"ability":[227,275,292],"trace":[229],"reasons":[231],"failure":[234],"scan":[237],"notify":[239],"user,":[241],"2)":[242],"Search":[243],"collected":[246],"form":[250],"Aggregation":[252],"search,":[253],"combination":[257],"queries.":[259],"That":[260],"is,":[261],"user":[263],"will":[264],"able":[266],"various":[270],"requests":[271],"together,":[272],"3)":[273],"set":[277],"parameters":[279],"such":[280,346],"as":[281,309,347],"determining":[282],"range":[284],"IPs":[286],"frequency,":[289],"4)":[290],"adjust":[294],"rate":[296],"sending":[298],"power":[303],"target":[307,317],"disrupt":[312],"operation":[314],"services,":[318],"5)":[320],"Filtering":[321],"metadata":[322],"high":[325],"speed.":[326],"results":[329],"section":[330],"this":[332],"paper,":[333],"order":[335],"show":[337],"capabilities":[339],"several":[344],"scenarios":[345],"emergence":[349],"fixing":[351],"CVEs,":[353],"dispersion":[355],"web":[357],"servers,":[358],"presence/absence":[360],"authentication":[362],"databases/data":[365],"stores/protocols,":[366],"Cryptojacking/Ransomware":[368],"detection":[369],"geographical":[372],"areas":[373],"analyzed":[376],"investigated.":[378]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4400409866","counts_by_year":[],"updated_date":"2025-01-08T08:23:37.775227","created_date":"2024-07-09"}