A new method for vulnerability and risk assessment of IoT

计算机科学 脆弱性(计算) 脆弱性评估 Python(编程语言) 路径(计算) 风险评估 节点(物理) 数据挖掘 分布式计算 计算机安全 计算机网络 心理学 结构工程 心理弹性 工程类 心理治疗师 操作系统
作者
Ferhat Arat,Sedat Akleylek
出处
期刊:Computer Networks [Elsevier]
卷期号:237: 110046-110046 被引量:1
标识
DOI:10.1016/j.comnet.2023.110046
摘要

In this paper, we propose a generic vulnerability and risk assessment method for IoT-enabled systems. The main aim is to provide risk detection and vulnerability assessment for IoT-based systems. We present three phases of risk assessment methodology: graph construction, attack path detection, and attack path filtering for high-level attack paths. We give attack path detection, risk level computing, and attack path removing procedures to validate these phases. We represent the IoT-based network as a graphical structure. Then, we construct the topology for a given IoT-based system. The smart home system is considered as a case scenario to present a realistic instance. The National Vulnerability Database (NVD), Common Vulnerability Scoring System (CVSS), and Common Vulnerability Exposures (CVE) metrics are used to assign vulnerabilities to devices. We formulate risk factors to compute risk levels for each node, attack path, and entire graph. We use the modified Depth First Algorithm (DFS) to find all attack paths for a source and target nodes. In addition, we compute risk levels using computing procedures. Further, we filter detected attack paths considering dominance level using computational metrics. We perform the simulation on a custom Python simulator considering the designed IoT-based smart home system. We compare our proposed methods with the previous ones. According to the experimental results, the proposed methods outperform existing vulnerability-based risk assessment models regarding running time complexity and operational cost.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
勤奋成风发布了新的文献求助10
刚刚
123完成签到,获得积分10
刚刚
宇宙拿铁完成签到 ,获得积分10
刚刚
GH完成签到,获得积分10
刚刚
1秒前
九局下半发布了新的文献求助10
1秒前
xiaotianli完成签到,获得积分10
1秒前
长度2到完成签到,获得积分10
1秒前
1秒前
李爱国应助傻傻的凌寒采纳,获得10
2秒前
2秒前
RJ应助toxin37采纳,获得10
3秒前
3秒前
3秒前
长孙明雪完成签到,获得积分10
4秒前
优秀的邪欢完成签到 ,获得积分10
4秒前
4秒前
万圣夜完成签到,获得积分10
4秒前
5秒前
我是老大应助LHZM采纳,获得10
6秒前
6秒前
安安完成签到,获得积分10
7秒前
丝绒发布了新的文献求助10
7秒前
8秒前
CipherSage应助A健采纳,获得10
8秒前
9秒前
乐乐应助12采纳,获得10
9秒前
Hiogteng发布了新的文献求助20
10秒前
tzhzh8发布了新的文献求助20
10秒前
xiaotianli发布了新的文献求助10
10秒前
闪闪乞完成签到,获得积分10
11秒前
诺克萨斯完成签到,获得积分10
11秒前
13秒前
电池小白完成签到,获得积分10
13秒前
wenllian完成签到,获得积分10
13秒前
13秒前
BowieHuang应助乘风文月采纳,获得20
14秒前
14秒前
xucc完成签到,获得积分10
14秒前
14秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Clinical Microbiology Procedures Handbook, Multi-Volume, 5th Edition 2000
The Cambridge History of China: Volume 4, Sui and T'ang China, 589–906 AD, Part Two 1000
The Composition and Relative Chronology of Dynasties 16 and 17 in Egypt 1000
Russian Foreign Policy: Change and Continuity 800
Real World Research, 5th Edition 800
Qualitative Data Analysis with NVivo By Jenine Beekhuyzen, Pat Bazeley · 2024 800
热门求助领域 (近24小时)
化学 材料科学 生物 医学 工程类 计算机科学 有机化学 物理 生物化学 纳米技术 复合材料 内科学 化学工程 人工智能 催化作用 遗传学 数学 基因 量子力学 物理化学
热门帖子
关注 科研通微信公众号,转发送积分 5718168
求助须知:如何正确求助?哪些是违规求助? 5250844
关于积分的说明 15284812
捐赠科研通 4868418
什么是DOI,文献DOI怎么找? 2614132
邀请新用户注册赠送积分活动 1564020
关于科研通互助平台的介绍 1521476