Risk Assessment Method of IoT Host Based on Attack Graph

被引:0
|
作者
Yang, Hongyu [1 ,2 ]
Yuan, Haihang [2 ]
Zhang, Liang [3 ]
机构
[1] School of Safety Science and Engineering, Civil Aviation University of China, Tianjin,300300, China
[2] School of Computer Science and Technology, Civil Aviation University of China, Tianjin,300300, China
[3] School of Information, The University of Arizona, Tucson,AZ,85721, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things - Topology
引用
收藏
相关论文
共 50 条
  • [1] Risk Assessment Method of IoT Host Based on Attack Graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5): : 1504 - 1513
  • [2] Host security assessment method based on attack graph
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (02): : 89 - 99
  • [3] A Distributed network risk assessment method based on attack graph
    Yang, Tian Chi
    Fang, Ming
    Shao, Qi Feng
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2335 - 2342
  • [4] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
    Luo, Zhiyong
    Xu, Rui
    Wang, Jianming
    Zhu, Weicheng
    International Journal of Network Security, 2022, 24 (05) : 787 - 796
  • [5] A Novel Method for Host Risk Assessment Based on Predecessor Attack
    Zhang, Xiao-song
    Huang, Lei
    Xu, Chun-xiang
    Chen, Ting
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2011), 2011, 8285
  • [6] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [7] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [8] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [9] Attack Graph - based Vulnerability Assessment of Rank Property in RPL-6LOWPAN in IoT
    Sahay, Rashmi
    Geethakumari, G.
    Modugu, Koushik
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 308 - 313
  • [10] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353