The 9th International Conference on Next Generation Computing 2023 (2023.12)바로가기
페이지
pp.300-303
저자
Arpita Dinesh Sarang, Ki-Woong Park
언어
영어(ENG)
URL
https://www.earticle.net/Article/A448176
원문정보
초록
영어
Cyberattacks have affected every technology in recent years, and the metaverse is not an exception. Users can engage with other users by navigating the metaverse with their avatar's associated user data. Attackers using the user data associated with avatars masquerade as users or penetrate through the metaverse's vulnerable infrastructure. There are multiple components of the metaverse infrastructure that are vulnerable to attack. The infrastructure becomes insecure when these components are developed without security in consideration. Cyberattacks that take advantage of these vulnerabilities compromise user privacy and cause the loss of sensitive data. This highlights the necessity of comprehending the infrastructure and the data flow through its essential components so that appropriate countermeasures can be built. Our study proposed a model that clarifies the data flow among the infrastructure's components for creating an avatar in the metaverse. We also identify the major threat causing cyberattacks per component. We state in our study's conclusion that such threats will have an impact on the metaverse's avatar and user data.
목차
Abstract I. INTRODUCTION II. RELATED WORK III. PROPOSED MODEL IV. THREAT IDENTIFICATION ON THE MODEL A. AI Model(component A) B. Cloud Computing (component B) C. IoT Devices (component C) D. Network Analysis (component D) V. CONCLUSION ACKNOWLEDGMENT REFERENCES
키워드
avatarmetaversecybersecuritycloud computingIoT (Internet of Things)Artificial Intelligence(AI)
저자
Arpita Dinesh Sarang [ SysCore Lab. (Convergence Engineering for Intelligent Drone) Sejong University ]
Ki-Woong Park [ Dept. of Computer and Information Security Sejong University ]
Corresponding Author