원문정보
초록
영어
Cyberattacks have affected every technology in recent years, and the metaverse is not an exception. Users can engage with other users by navigating the metaverse with their avatar's associated user data. Attackers using the user data associated with avatars masquerade as users or penetrate through the metaverse's vulnerable infrastructure. There are multiple components of the metaverse infrastructure that are vulnerable to attack. The infrastructure becomes insecure when these components are developed without security in consideration. Cyberattacks that take advantage of these vulnerabilities compromise user privacy and cause the loss of sensitive data. This highlights the necessity of comprehending the infrastructure and the data flow through its essential components so that appropriate countermeasures can be built. Our study proposed a model that clarifies the data flow among the infrastructure's components for creating an avatar in the metaverse. We also identify the major threat causing cyberattacks per component. We state in our study's conclusion that such threats will have an impact on the metaverse's avatar and user data.
목차
I. INTRODUCTION
II. RELATED WORK
III. PROPOSED MODEL
IV. THREAT IDENTIFICATION ON THE MODEL
A. AI Model(component A)
B. Cloud Computing (component B)
C. IoT Devices (component C)
D. Network Analysis (component D)
V. CONCLUSION
ACKNOWLEDGMENT
REFERENCES
