Risk Assessment Method of IoT Host Based on Attack Graph

被引:0
|
作者
Yang, Hongyu [1 ,2 ]
Yuan, Haihang [2 ]
Zhang, Liang [3 ]
机构
[1] School of Safety Science and Engineering, Civil Aviation University of China, Tianjin,300300, China
[2] School of Computer Science and Technology, Civil Aviation University of China, Tianjin,300300, China
[3] School of Information, The University of Arizona, Tucson,AZ,85721, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things - Topology
引用
收藏
相关论文
共 50 条
  • [31] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [32] Algorithm of generating host-based attack graph for overall network
    Zhong S.
    Xu G.
    Yang Y.
    Yao W.
    Yang Y.
    Advances in Information Sciences and Service Sciences, 2011, 3 (08): : 104 - 110
  • [33] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [34] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [35] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [36] Method of Cyber Attack Attribution Based on Graph Model
    Huang, Ke-Zhen
    Lian, Yi-Feng
    Feng, Deng-Guo
    Zhang, Hai-Xia
    Wu, Di
    Ma, Xiang-Liang
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (02): : 683 - 698
  • [37] Risk Assessment and Diagnostic Method of Sulfate Attack of Cement-based Material
    Zhang, Fengchen
    Fang, Yonghao
    Shen, Dejian
    Zhou, Jikai
    ADVANCED BUILDING MATERIALS AND SUSTAINABLE ARCHITECTURE, PTS 1-4, 2012, 174-177 : 121 - +
  • [38] Risk Assessment of Information System using the Shell Theory and Attack Graph
    Cheng, Xiaorong
    Zhang, Zhenshan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 537 - 541
  • [39] A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
    Bin Hamed Almazrouei, Omar Saif Musabbeh
    Magalingam, Pritheega
    Hasan, Mohammad Kamrul
    Shanmugam, Mohana
    IEEE ACCESS, 2023, 11 : 44350 - 44376
  • [40] Network attack prediction method based on threat intelligence for IoT
    Hongbin Zhang
    Yuzi Yi
    Junshe Wang
    Ning Cao
    Qiang Duan
    Multimedia Tools and Applications, 2019, 78 : 30257 - 30270