A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between n...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8290918/ |
id |
doaj-9876a9ad61e44cc29105dc61c1f5579b |
---|---|
record_format |
Article |
spelling |
doaj-9876a9ad61e44cc29105dc61c1f5579b2021-03-29T20:38:22ZengIEEEIEEE Access2169-35362018-01-0168599860910.1109/ACCESS.2018.28056908290918A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum FlowHuan Wang0Zhanfang Chen1Jianping Zhao2https://orcid.org/0000-0002-4080-8448Xiaoqiang Di3Dan Liu4Department of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaTo solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between network nodes. The attack risk is calculated by common vulnerability scoring system, which increases the attack path quantification degree. The maximum loss flow describes the attack path, evaluates the network vulnerability by maximum loss flow and loss saturation and represents the vulnerability relevance. Avoiding the repeat calculation and obtaining the potential key vulnerability path fast, the augmented road algorithm is used to find optimal attack path within global path. The result shows that the method is feasible and can evaluate the vulnerability and risk path objectively.https://ieeexplore.ieee.org/document/8290918/Vulnerability assessmentattack graphmaximum flowindustrial Internet of Things |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Huan Wang Zhanfang Chen Jianping Zhao Xiaoqiang Di Dan Liu |
spellingShingle |
Huan Wang Zhanfang Chen Jianping Zhao Xiaoqiang Di Dan Liu A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow IEEE Access Vulnerability assessment attack graph maximum flow industrial Internet of Things |
author_facet |
Huan Wang Zhanfang Chen Jianping Zhao Xiaoqiang Di Dan Liu |
author_sort |
Huan Wang |
title |
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow |
title_short |
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow |
title_full |
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow |
title_fullStr |
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow |
title_full_unstemmed |
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow |
title_sort |
vulnerability assessment method in industrial internet of things based on attack graph and maximum flow |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between network nodes. The attack risk is calculated by common vulnerability scoring system, which increases the attack path quantification degree. The maximum loss flow describes the attack path, evaluates the network vulnerability by maximum loss flow and loss saturation and represents the vulnerability relevance. Avoiding the repeat calculation and obtaining the potential key vulnerability path fast, the augmented road algorithm is used to find optimal attack path within global path. The result shows that the method is feasible and can evaluate the vulnerability and risk path objectively. |
topic |
Vulnerability assessment attack graph maximum flow industrial Internet of Things |
url |
https://ieeexplore.ieee.org/document/8290918/ |
work_keys_str_mv |
AT huanwang avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT zhanfangchen avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT jianpingzhao avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT xiaoqiangdi avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT danliu avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT huanwang vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT zhanfangchen vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT jianpingzhao vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT xiaoqiangdi vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow AT danliu vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow |
_version_ |
1724194454790733824 |