Modified graph-based algorithm to analyze security threats in IoT

被引:0
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [2 ,3 ,4 ]
机构
[1] Samsun Univ, Dept Software Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ Samsun, Dept Comp Engn, Samsun, Turkiye
[3] Univ Tartu, Tartu, Estonia
[4] Ondokuz Mayis Univ Samsun, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
关键词
Industrial IoT; Security; Risk assessment; Threat graph; Graph theory; Threats; INDUSTRIAL INTERNET; MANAGEMENT;
D O I
10.7717/peerj-cs.1743
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] Graph-Based Random Sampling for Massive Access in IoT Networks
    Zhai, Shiyu
    Li, Guobing
    Qi, Zefeng
    Zhang, Guomei
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [42] Graph-based technique for survivability assessment and optimization of IoT applications
    Shakhov, Vladimir
    Koo, Insoo
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 105 - 114
  • [43] DCCGAN based intrusion detection for detecting security threats in IoT
    Cyriac, Robin
    Balasubaramanian, Sundaravadivazhagn
    Balamurugan, V.
    Karthikeyan, R.
    [J]. INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2024, 23 (02) : 111 - 124
  • [44] Security Threats and Issues in Automation IoT
    Varga, Pal
    Plosz, Sandor
    Soos, Gabor
    Hegedus, Csaba
    [J]. 2017 IEEE 13TH INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2017), 2017,
  • [45] A Survey on Threats and Security Solutions for IoT
    Gavra, Vlad-Dacian
    Dobra, Ionut-Marian
    Pop, Ovidiu Aurel
    [J]. 2020 43RD INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE), 2020,
  • [46] A Survey of IoT Security Threats and Solutions
    Radovici, Alexandru
    Rusu, Cristian
    Serban, Razvan
    [J]. 2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [47] IoT Smart Health Security Threats
    Butt, Shariq Aziz
    Ali, Arshad
    Jorge Luis, Diaz-Martinez
    Emiro, De-La-Hoz-Franco
    Jamal, Tauseef
    Shoaib, Muhammad
    [J]. 2019 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2019), 2019, : 26 - 31
  • [48] Cyber security threats in IoT: A review
    Rana, Pragati
    Patil, B. P.
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (02) : 105 - 120
  • [49] A Taxonomy of IoT: Security and Privacy Threats
    Alsamani, Badr
    Lahza, Husam
    [J]. CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 72 - 77
  • [50] Graph Clustering: a graph-based clustering algorithm for the electromagnetic calorimeter in LHCb
    Canudas, Nuria Valls
    Gomez, Miriam Calvo
    Vilasis-Cardona, Xavier
    Ribe, Elisabet Golobardes
    [J]. EUROPEAN PHYSICAL JOURNAL C, 2023, 83 (02):