期刊文献+

KNEMAG:Key Node Estimation Mechanism Based on Attack Graph for IoT Security 被引量:4

下载PDF
导出
摘要 With the rapid development and widespread application of the IoT,the at-tacks against IoT vulnerabilities have become more complex and diverse.Most of the previous research focused on node vulnerability and its risk analysis.There is little information available about the importance of the location of the node in the system.Therefore,an estimation mechanism is proposed to assess the key node of the IoT system.The estimation of the key node includes two parts:one is the utilization relationship between nodes,and the other is the impact on the system after the node is conquered.We use the node importance value and the node risk value to quantify these two parts.First,the node importance value is calculated by considering the attack path that pass through the node and the probability that the attacker will abandon the attack.Second,in addition to node vulnerabilities and the consequences of being attacked,two quantitative indicators are proposed to comprehensively assess the impact of nodes on the system security,and the node risk value is calculated based on the grey correlation analysis method.Third,the key node in the IoT system could be obtained by integrating the node importance value and risk value.Finally,the simulation experiment result shows that the presented method could find the key node of the system quickly and accurately.
出处 《Journal on Internet of Things》 2020年第4期145-162,共18页
基金 This work is supported by the National Key R&D Program of China(2017YFB0802703) Major Scientific and Technological Special Project of Guizhou Province(20183001) Open Foundation of Guizhou Provincial Key VOLUME XX,2019 Laboratory of Public Big Data(2018BDKFJJ014) Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ019) Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ022).
  • 相关文献

参考文献3

二级参考文献29

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 2Mehta V, Bartzis C, Zhu H F. Ranking attack graphs//Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID). Hamburg, Germany, 2006, 127-144. 被引量:1
  • 3Sawilla R, Ou X M. Identifying critical attack assets in dependency attack graphs//Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS). Malaga, Spain, 2008:18-34. 被引量:1
  • 4Ou X M, Boyer W F. A scalable approach to attack graph generation//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). Alexandria, USA, 2006. 336-345. 被引量:1
  • 5Wang L Y, Tania I. An attack graph-based probabilistic security metric//Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec). London, UK, 2008:283-296. 被引量:1
  • 6Homer J, Ou X M, Schmidt D. A sound and practical approach to quantifying security risk in enterprise networks. Kansas State University: Technical Report 2009-3, 2009. 被引量:1
  • 7Singhal A, Ou X M. Security risk analysis of computer networks: Techniques and challenge//Proceedings of the 16th ACM Computer and Communications Security(CCS). Chicago, USA, 2009. 被引量:1
  • 8Wang L Y, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs//Proceedings of the 21th IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSee). Redondo Beach, CA, USA, 2007:98-112. 被引量:1
  • 9Wang L Y, Singhal A, Jajodia S. Toward measuring network security using attack graphs//Proceedings of the 3rd International Workshop on Quality of Protection (QoP). Alexandria, USA, 2007:49-54. 被引量:1
  • 10Shon T,Koo B,Choi H,et al.Security Architecture for IEEE 802.15.4-based Wireless Sensor Network[C] //Proc.of the 4th International Symposium on Wireless Pervasive Computing.Melbourne,Australia:[s.n.] ,2009:1-5. 被引量:1

共引文献72

同被引文献22

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部