Risk Assessment Method of IoT Host Based on Attack Graph

被引:0
|
作者
Yang, Hongyu [1 ,2 ]
Yuan, Haihang [2 ]
Zhang, Liang [3 ]
机构
[1] School of Safety Science and Engineering, Civil Aviation University of China, Tianjin,300300, China
[2] School of Computer Science and Technology, Civil Aviation University of China, Tianjin,300300, China
[3] School of Information, The University of Arizona, Tucson,AZ,85721, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Internet of things - Topology
引用
收藏
相关论文
共 50 条
  • [41] Network attack prediction method based on threat intelligence for IoT
    Zhang, Hongbin
    Yi, Yuzi
    Wang, Junshe
    Cao, Ning
    Duan, Qiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (21) : 30257 - 30270
  • [42] An Attack Graph Based Risk Management Approach of an Enterprise LAN
    Bhattacharya, Somak
    Ghosh, S. K.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (02): : 119 - 127
  • [43] An approach of security risk evaluation based on the Bayesian attack graph
    Hui, Wang
    Fuwang, Chen
    Yunfeng, Wang
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 953 - 960
  • [44] An approach to evaluate network security risk based on attack graph
    Hu, Xiaoyun
    Yu, Yang
    Xia, Chunhe
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
  • [45] Constructing IoT Botnets Attack Pattern for Host-based and Network-based Platform
    Zaki, Wan Nur Fatihah Wan Mohd
    Abdullah, Raihana Syahirah
    Yassin, Warusia
    Faizal, M. A.
    Rosli, Muhammad Safwan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 161 - 168
  • [46] A Risk Assessment Method of Network Host Node with Host Importance
    Yang, Hongyu
    Yuan, Haihang
    Zhang, Liang
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2022, 45 (02): : 16 - 21
  • [47] A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
    Zhou, Ying
    Zhang, Zhiyong
    Zhao, Kejing
    Zhang, Zhongya
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [48] An IoT Ontology Class Recommendation Method Based on Knowledge Graph
    Wang, Xi
    Yin, Chuantao
    Fan, Xin
    Wu, Si
    Wang, Lan
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT I, 2021, 12815 : 666 - 678
  • [49] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
  • [50] Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
    Wang W.
    Du X.
    Shan D.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 1 - 17