计算机科学
脆弱性(计算)
路径(计算)
节点(物理)
网络拓扑
Python(编程语言)
数据挖掘
脆弱性评估
分布式计算
理论计算机科学
拓扑(电路)
计算机安全
计算机网络
数学
心理学
结构工程
心理弹性
工程类
心理治疗师
操作系统
组合数学
作者
Ferhat Arat,Sedat Akleylek
标识
DOI:10.1016/j.cose.2023.103174
摘要
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical systems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering.
科研通智能强力驱动
Strongly Powered by AbleSci AI